Received: by 2002:ab2:1689:0:b0:1f7:5705:b850 with SMTP id d9csp184208lqa; Fri, 26 Apr 2024 20:34:29 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCU2s9r5oyvuwthw2vwXr4w43IfW3KT2qs4uRsMWkpd53WOD3OuAyJtDYgz/3iRZl2eMYxcR7kQbynsgOm1DTSn/0RKymTLfhnrTSde4Vw== X-Google-Smtp-Source: AGHT+IEHK8Qu5xDnKZo4q/e0Oy5BEmFLK17ZpPl/RORYWZjvykca+M7Kk9Vfz36f5eN0HAhz2Qc5 X-Received: by 2002:a50:9f6b:0:b0:571:fc02:1ce with SMTP id b98-20020a509f6b000000b00571fc0201cemr2820443edf.38.1714188869680; Fri, 26 Apr 2024 20:34:29 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714188869; cv=pass; d=google.com; s=arc-20160816; b=cvaYm5wA36HZv4rEMyuklxMIvYm87+NTt0bCfaHLea9uUsQHsK9nc5j6PtoYY+ScbM jLIluTBWU7Wi8OMGEbayqApe49VK+eip/GPzQ46LZCQ98K79cWd6sWfau7FYdySdLEpR GrXG7pyeZbdGZ6WPu6u5A1vG4Go61hKNYdruVblPGmabzk6tbwFhm2Um1T9X9CNAwxPr OUWO4YNCdHXh2QBWscadAqLrxndIBwyh5HlAMrLpcFo1mOePvKqqbBrLVL8qrl/3+f+8 vyu9GxeJX95xxrcXkCb7zpjxLKagEp3m34Bjq22XCQeRjI3JnCJpdYVQZzdR/5+5qJ0H tlqw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :subject:date:from:dkim-signature; bh=lINVXse1vTRGdl9wLae2pzrlRJNK/T1vFtdKbW+25UM=; fh=eCZmv8745b0DZZ+/zKsSE7ZGKoWjbnt74XvLzp6GIwc=; b=RKWSLkqv29FtfSzF1QjvyshywWbSt8LpcG52kWgn0kn43s9OATvi6ZlhHMHZ1B7nva NBMNIfO8K8GJ6nlaLVJU04GZcqCNKOO6Pye6kzUUa7jHHrPdIr6IBjYK7N2WHQcCTMA4 RNXbphucmAaS2uVhqhTNVFcoeLtUg4jsbl7kNXkeqPrG9GXVFX9O299EdlkQYHRbMJT2 vVgPwcq/5ze6rkncHMadP46ijzj/00/wmoeAOU5NMgoPBagdPunJqKCikoGoylZY2vK9 +q6kT+J6TKHDDjwfg+fqGbydp+OT5RWLL+IQ4oPwKZNeLij7ByDqR2cpxnMfhOO32Ohl NFDA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="Bk7e8i/r"; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel+bounces-160881-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-160881-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id g33-20020a056402322100b00572701284d7si13642eda.243.2024.04.26.20.34.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 26 Apr 2024 20:34:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-160881-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="Bk7e8i/r"; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel+bounces-160881-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-160881-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 41DC91F22B19 for ; Sat, 27 Apr 2024 03:34:29 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 712E63DB97; Sat, 27 Apr 2024 03:34:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="Bk7e8i/r" Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A7B663BBDC; Sat, 27 Apr 2024 03:34:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.9 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714188847; cv=none; b=bGq9EuGGyQibgswFt9TKJIqay9Bz6IEIJtjdW9bdO7WwJLoq1dGkQviu1Rn9D8l8gGm85Z9ATKpKK0OzXuWWmiaFO4QhouD1hm/Wjk2GczYlbjsoSHDiwcvLxwM7O0w4ZGBTdftk9i85VpviZu7I8Qqu1Cy7qe+LNIwAd4/+KJM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714188847; c=relaxed/simple; bh=i5BOGe2ACevG3RNFYAvH6QikCVfdTPZPiIiYghqGFo0=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=AQUmd+O14Wu1cXq9a9vl09fEjVwgghf7Ny0YaGWHzHaj6ES5xk0+ujcxKbwZpeBogSWF2jluq/rmhvXoLi91X7qg7iCreamPxxm6BHopopOpJAz7bzSnGxwY9Hn3a6I7byNqJgQYFnvjsuwYl5cdjZHEqzsblTPMA2u1jlEbSgs= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=Bk7e8i/r; arc=none smtp.client-ip=192.198.163.9 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1714188846; x=1745724846; h=from:date:subject:mime-version:content-transfer-encoding: message-id:references:in-reply-to:to:cc; bh=i5BOGe2ACevG3RNFYAvH6QikCVfdTPZPiIiYghqGFo0=; b=Bk7e8i/rJMfpNYFvXXenFhNWW5bLVZIGr5Lkpt9iOtoH6iws/I/TVgsD tt5PnjutKv2fuMSKk1ByCw4PZvADdk6vaG9gGQRuGYeUN0ET5TibEM1gu 3S0krNlcpqQnHXolSFNz40LLtkY93KpeJVu/LfC39Ea49Vru6WHK1QfGJ QvK69WEbhYMJPClzUSiLFRgYh9EDIVyhlESHcbnPZZHeukngn2cRd4qmO gC6swU6ZeNo8dkM8dqUB6CwLT0NTuEAX4JoM/+lyScaXsTT1n5LXXalTM 1TP3Z1WIDOIHho0gqPNCl+7zcbriVLbNCWzaENXW+4oJCu2qa9g2mwWda g==; X-CSE-ConnectionGUID: K7dk2JgXRKyk5nicc2AWYA== X-CSE-MsgGUID: tIkA4MVTSrCEumTqCr0KLg== X-IronPort-AV: E=McAfee;i="6600,9927,11056"; a="20620066" X-IronPort-AV: E=Sophos;i="6.07,234,1708416000"; d="scan'208";a="20620066" Received: from fmviesa007.fm.intel.com ([10.60.135.147]) by fmvoesa103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Apr 2024 20:34:04 -0700 X-CSE-ConnectionGUID: Mk0ePGaGTtGXL9GY78TD3g== X-CSE-MsgGUID: EkeWqQVsTE231n31k+3DZw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,234,1708416000"; d="scan'208";a="25593988" Received: from iweiny-mobl.amr.corp.intel.com (HELO localhost) ([10.212.65.80]) by fmviesa007-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Apr 2024 20:34:04 -0700 From: Ira Weiny Date: Fri, 26 Apr 2024 20:34:00 -0700 Subject: [PATCH v4 1/2] acpi/ghes: Process CXL Component Events Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20240426-cxl-cper3-v4-1-58076cce1624@intel.com> References: <20240426-cxl-cper3-v4-0-58076cce1624@intel.com> In-Reply-To: <20240426-cxl-cper3-v4-0-58076cce1624@intel.com> To: Dave Jiang , Dan Williams , Jonathan Cameron , Smita Koralahalli , Shiju Jose Cc: Dan Carpenter , Yazen Ghannam , Davidlohr Bueso , Alison Schofield , Vishal Verma , Ard Biesheuvel , linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-cxl@vger.kernel.org, Ira Weiny , "Rafael J. Wysocki" , Tony Luck , Borislav Petkov X-Mailer: b4 0.13-dev-2d940 X-Developer-Signature: v=1; a=ed25519-sha256; t=1714188842; l=7935; i=ira.weiny@intel.com; s=20221211; h=from:subject:message-id; bh=i5BOGe2ACevG3RNFYAvH6QikCVfdTPZPiIiYghqGFo0=; b=i2DMTC76k2EebTDhNxkVtKqdver60DvocoNbGYJmxK038dMB0MkLf8QuUAeBpzvSO4qxMOrMD X+7LhS5ZWv4BBPKgDPPh0RIhNDDOVEIcCEeESd//bL+xovE8XQrjALO X-Developer-Key: i=ira.weiny@intel.com; a=ed25519; pk=noldbkG+Wp1qXRrrkfY1QJpDf7QsOEthbOT7vm0PqsE= BIOS can configure memory devices as firmware first. This will send CXL events to the firmware instead of the OS. The firmware can then inform the OS of these events via UEFI. UEFI v2.10 section N.2.14 defines a Common Platform Error Record (CPER) format for CXL Component Events. The format is mostly the same as the CXL Common Event Record Format. The difference lies in the use of a GUID as the CPER Section Type which matches the UUID defined in CXL 3.1 Table 8-43. Currently a configuration such as this will trace a non standard event in the log omitting useful details of the event. In addition the CXL sub-system contains additional region and HPA information useful to the user.[0] The CXL code is required to be called from process context as it needs to take a device lock. The GHES code may be in interrupt context. This complicated the use of a callback. Dan Williams suggested the use of work items as an atomic way of switching between the callback execution and a default handler.[1] The use of a kfifo simplifies queue processing by providing lock free fifo operations. cxl_cper_kfifo_get() allows easier management of the kfifo between the ghes and cxl modules. CXL 3.1 Table 8-127 requires a device to have a queue depth of 1 for each of the four event logs. A combined queue depth of 32 is chosen to provide room for 8 entries of each log type. Add GHES support to detect CXL CPER records. Add the ability for the CXL sub-system to register a work queue to process the events. This patch adds back the functionality which was removed to fix the report by Dan Carpenter[2]. Cc: Ard Biesheuvel Cc: Rafael J. Wysocki Cc: Tony Luck Cc: Borislav Petkov Suggested-by: Dan Carpenter Suggested-by: Dan Williams Link: http://lore.kernel.org/r/cover.1711598777.git.alison.schofield@intel.com [0] Link: http://lore.kernel.org/r/65d111eb87115_6c745294ac@dwillia2-xfh.jf.intel.com.notmuch [1] Link: http://lore.kernel.org/r/b963c490-2c13-4b79-bbe7-34c6568423c7@moroto.mountain [2] Reviewed-by: Dan Williams Signed-off-by: Ira Weiny --- Changes: [iweiny: pick up tag] [djbw: use proper link format] --- drivers/acpi/apei/ghes.c | 110 ++++++++++++++++++++++++++++++++++++++++++++++ include/linux/cxl-event.h | 27 ++++++++++++ 2 files changed, 137 insertions(+) diff --git a/drivers/acpi/apei/ghes.c b/drivers/acpi/apei/ghes.c index 512067cac170..2247a1535b52 100644 --- a/drivers/acpi/apei/ghes.c +++ b/drivers/acpi/apei/ghes.c @@ -26,6 +26,8 @@ #include #include #include +#include +#include #include #include #include @@ -33,6 +35,7 @@ #include #include #include +#include #include #include #include @@ -673,6 +676,101 @@ static void ghes_defer_non_standard_event(struct acpi_hest_generic_data *gdata, schedule_work(&entry->work); } +/* CXL Event record UUIDs are formated as GUIDs and reported in section type */ + +/* + * General Media Event Record + * CXL rev 3.0 Section 8.2.9.2.1.1; Table 8-43 + */ +#define CPER_SEC_CXL_GEN_MEDIA_GUID \ + GUID_INIT(0xfbcd0a77, 0xc260, 0x417f, \ + 0x85, 0xa9, 0x08, 0x8b, 0x16, 0x21, 0xeb, 0xa6) + +/* + * DRAM Event Record + * CXL rev 3.0 section 8.2.9.2.1.2; Table 8-44 + */ +#define CPER_SEC_CXL_DRAM_GUID \ + GUID_INIT(0x601dcbb3, 0x9c06, 0x4eab, \ + 0xb8, 0xaf, 0x4e, 0x9b, 0xfb, 0x5c, 0x96, 0x24) + +/* + * Memory Module Event Record + * CXL rev 3.0 section 8.2.9.2.1.3; Table 8-45 + */ +#define CPER_SEC_CXL_MEM_MODULE_GUID \ + GUID_INIT(0xfe927475, 0xdd59, 0x4339, \ + 0xa5, 0x86, 0x79, 0xba, 0xb1, 0x13, 0xb7, 0x74) + +/* Room for 8 entries for each of the 4 event log queues */ +#define CXL_CPER_FIFO_DEPTH 32 +DEFINE_KFIFO(cxl_cper_fifo, struct cxl_cper_work_data, CXL_CPER_FIFO_DEPTH); + +/* Synchronize schedule_work() with cxl_cper_work changes */ +static DEFINE_SPINLOCK(cxl_cper_work_lock); +struct work_struct *cxl_cper_work; + +static void cxl_cper_post_event(enum cxl_event_type event_type, + struct cxl_cper_event_rec *rec) +{ + struct cxl_cper_work_data wd; + + if (rec->hdr.length <= sizeof(rec->hdr) || + rec->hdr.length > sizeof(*rec)) { + pr_err(FW_WARN "CXL CPER Invalid section length (%u)\n", + rec->hdr.length); + return; + } + + if (!(rec->hdr.validation_bits & CPER_CXL_COMP_EVENT_LOG_VALID)) { + pr_err(FW_WARN "CXL CPER invalid event\n"); + return; + } + + guard(spinlock_irqsave)(&cxl_cper_work_lock); + + if (!cxl_cper_work) + return; + + wd.event_type = event_type; + memcpy(&wd.rec, rec, sizeof(wd.rec)); + + if (!kfifo_put(&cxl_cper_fifo, wd)) { + pr_err_ratelimited("CXL CPER kfifo overflow\n"); + return; + } + + schedule_work(cxl_cper_work); +} + +int cxl_cper_register_work(struct work_struct *work) +{ + if (cxl_cper_work) + return -EINVAL; + + guard(spinlock)(&cxl_cper_work_lock); + cxl_cper_work = work; + return 0; +} +EXPORT_SYMBOL_NS_GPL(cxl_cper_register_work, CXL); + +int cxl_cper_unregister_work(struct work_struct *work) +{ + if (cxl_cper_work != work) + return -EINVAL; + + guard(spinlock)(&cxl_cper_work_lock); + cxl_cper_work = NULL; + return 0; +} +EXPORT_SYMBOL_NS_GPL(cxl_cper_unregister_work, CXL); + +int cxl_cper_kfifo_get(struct cxl_cper_work_data *wd) +{ + return kfifo_get(&cxl_cper_fifo, wd); +} +EXPORT_SYMBOL_NS_GPL(cxl_cper_kfifo_get, CXL); + static bool ghes_do_proc(struct ghes *ghes, const struct acpi_hest_generic_status *estatus) { @@ -707,6 +805,18 @@ static bool ghes_do_proc(struct ghes *ghes, } else if (guid_equal(sec_type, &CPER_SEC_PROC_ARM)) { queued = ghes_handle_arm_hw_error(gdata, sev, sync); + } else if (guid_equal(sec_type, &CPER_SEC_CXL_GEN_MEDIA_GUID)) { + struct cxl_cper_event_rec *rec = acpi_hest_get_payload(gdata); + + cxl_cper_post_event(CXL_CPER_EVENT_GEN_MEDIA, rec); + } else if (guid_equal(sec_type, &CPER_SEC_CXL_DRAM_GUID)) { + struct cxl_cper_event_rec *rec = acpi_hest_get_payload(gdata); + + cxl_cper_post_event(CXL_CPER_EVENT_DRAM, rec); + } else if (guid_equal(sec_type, &CPER_SEC_CXL_MEM_MODULE_GUID)) { + struct cxl_cper_event_rec *rec = acpi_hest_get_payload(gdata); + + cxl_cper_post_event(CXL_CPER_EVENT_MEM_MODULE, rec); } else { void *err = acpi_hest_get_payload(gdata); diff --git a/include/linux/cxl-event.h b/include/linux/cxl-event.h index 03fa6d50d46f..a0067c49e2ca 100644 --- a/include/linux/cxl-event.h +++ b/include/linux/cxl-event.h @@ -3,6 +3,8 @@ #ifndef _LINUX_CXL_EVENT_H #define _LINUX_CXL_EVENT_H +#include + /* * Common Event Record Format * CXL rev 3.0 section 8.2.9.2.1; Table 8-42 @@ -140,4 +142,29 @@ struct cxl_cper_event_rec { union cxl_event event; } __packed; +struct cxl_cper_work_data { + enum cxl_event_type event_type; + struct cxl_cper_event_rec rec; +}; + +#ifdef CONFIG_ACPI_APEI_GHES +int cxl_cper_register_work(struct work_struct *work); +int cxl_cper_unregister_work(struct work_struct *work); +int cxl_cper_kfifo_get(struct cxl_cper_work_data *wd); +#else +static inline int cxl_cper_register_work(struct work_struct *work); +{ + return 0; +} + +static inline int cxl_cper_unregister_work(struct work_struct *work); +{ + return 0; +} +static inline int cxl_cper_kfifo_get(struct cxl_cper_work_data *wd) +{ + return 0; +} +#endif + #endif /* _LINUX_CXL_EVENT_H */ -- 2.44.0