From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4BD51C54E58 for ; Tue, 12 Mar 2024 06:06:03 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 65CCF8D0010; Tue, 12 Mar 2024 02:06:02 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 60D146B011A; Tue, 12 Mar 2024 02:06:02 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4D4228D0010; Tue, 12 Mar 2024 02:06:02 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 39DEF6B018F for ; Tue, 12 Mar 2024 02:06:02 -0400 (EDT) Received: from smtpin17.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 050CAA0E8B for ; Tue, 12 Mar 2024 06:05:58 +0000 (UTC) X-FDA: 81887351238.17.ABC6235 Received: from out30-112.freemail.mail.aliyun.com (out30-112.freemail.mail.aliyun.com [115.124.30.112]) by imf30.hostedemail.com (Postfix) with ESMTP id 6397F80012 for ; Tue, 12 Mar 2024 06:05:55 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=linux.alibaba.com header.s=default header.b=SAIxxY67; dmarc=pass (policy=none) header.from=linux.alibaba.com; spf=pass (imf30.hostedemail.com: domain of xueshuai@linux.alibaba.com designates 115.124.30.112 as permitted sender) smtp.mailfrom=xueshuai@linux.alibaba.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1710223557; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=+tAyefb9X6kRjApZV5oPZWTBz3sh185ettyS9iiaj4k=; b=w/2VdqZNzq15XOgA7Hydwf+UiwvdRCPXmIiF9w6+k7UPj072bwlCZw+O2mlwKPv15/3LVh CMze7XZYSGE+os2NXPWBMfOrujseEjZdVlu7Q6s914JXvH/Xw1m5uah5DkbRWQYw7I64YD oU9FBMzUtArTlqbGkTRvDMMbpnQNEh4= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=linux.alibaba.com header.s=default header.b=SAIxxY67; dmarc=pass (policy=none) header.from=linux.alibaba.com; spf=pass (imf30.hostedemail.com: domain of xueshuai@linux.alibaba.com designates 115.124.30.112 as permitted sender) smtp.mailfrom=xueshuai@linux.alibaba.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1710223557; a=rsa-sha256; cv=none; b=xIvfh+Hb69KariSxBCqd5u5crC5nsVEXKD05IIfGguerSkAG1bBvfu0mA9iv6l7fP+wDfe lxsKu2mHmQGymZYk/jGY0EEfQxuMJ1bnB807ojKyUQ5woq76VOrVSCoe/iCa1MTKE91XhT fkwvg48LVlfcW7dj/6cKNE68BtYmflI= DKIM-Signature:v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.alibaba.com; s=default; t=1710223552; h=Message-ID:Date:MIME-Version:From:Subject:To:Content-Type; bh=+tAyefb9X6kRjApZV5oPZWTBz3sh185ettyS9iiaj4k=; b=SAIxxY67l9mMRH/Faczezr5ve+81pDcrAnAaC99+VoNi5JQkP4ip9seIgXGSxq9qu9rcDLzHFx4l943ESRL+xT5/jeaRiLQ8SbD76cSI5yTuAjv31cZNYzTUQZUEk5VQM/eNaCTi4tMNEmNX7By55sRn2vPIwkqaA01RCptMer4= X-Alimail-AntiSpam:AC=PASS;BC=-1|-1;BR=01201311R151e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046060;MF=xueshuai@linux.alibaba.com;NM=1;PH=DS;RN=32;SR=0;TI=SMTPD_---0W2KiIQW_1710223549; Received: from 30.240.112.150(mailfrom:xueshuai@linux.alibaba.com fp:SMTPD_---0W2KiIQW_1710223549) by smtp.aliyun-inc.com; Tue, 12 Mar 2024 14:05:51 +0800 Message-ID: <2a6642a1-d20d-4588-9e5c-a4693f96fe38@linux.alibaba.com> Date: Tue, 12 Mar 2024 14:05:48 +0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird From: Shuai Xue Subject: Re: [PATCH v11 3/3] ACPI: APEI: handle synchronous exceptions in task work to send correct SIGBUS si_code To: Borislav Petkov Cc: rafael@kernel.org, wangkefeng.wang@huawei.com, tanxiaofei@huawei.com, mawupeng1@huawei.com, tony.luck@intel.com, linmiaohe@huawei.com, naoya.horiguchi@nec.com, james.morse@arm.com, gregkh@linuxfoundation.org, will@kernel.org, jarkko@kernel.org, linux-acpi@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, akpm@linux-foundation.org, linux-edac@vger.kernel.org, x86@kernel.org, justin.he@arm.com, ardb@kernel.org, ying.huang@intel.com, ashish.kalra@amd.com, baolin.wang@linux.alibaba.com, tglx@linutronix.de, mingo@redhat.com, dave.hansen@linux.intel.com, lenb@kernel.org, hpa@zytor.com, robert.moore@intel.com, lvying6@huawei.com, xiexiuqi@huawei.com, zhuo.song@linux.alibaba.com References: <20221027042445.60108-1-xueshuai@linux.alibaba.com> <20240204080144.7977-4-xueshuai@linux.alibaba.com> <20240308101836.GDZerl_IXIkWt8VuZN@fat_crate.local> Content-Language: en-US In-Reply-To: <20240308101836.GDZerl_IXIkWt8VuZN@fat_crate.local> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 6397F80012 X-Rspam-User: X-Rspamd-Server: rspam05 X-Stat-Signature: 94ynw3876uegxjfuxttrb3wqy5g6ywe1 X-HE-Tag: 1710223555-996189 X-HE-Meta: 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 +9g== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 2024/3/8 18:18, Borislav Petkov wrote: > On Sun, Feb 04, 2024 at 04:01:44PM +0800, Shuai Xue wrote: >> Hardware errors could be signaled by asynchronous interrupt, e.g. when an >> error is detected by a background scrubber, or signaled by synchronous >> exception, e.g. when a CPU tries to access a poisoned cache line. Since >> commit a70297d22132 ("ACPI: APEI: set memory failure flags as >> MF_ACTION_REQUIRED on synchronous events")', the flag MF_ACTION_REQUIRED >> could be used to determine whether a synchronous exception occurs on ARM64 >> platform. When a synchronous exception is detected, the kernel should >> terminate the current process which accessing the poisoned page. This is > > "which has accessed poison data" Thank you. Will fix the grammer. > >> done by sending a SIGBUS signal with an error code BUS_MCEERR_AR, >> indicating an action-required machine check error on read. >> >> However, the memory failure recovery is incorrectly sending a SIGBUS >> with wrong error code BUS_MCEERR_AO for synchronous errors in early kill >> mode, even MF_ACTION_REQUIRED is set. The main problem is that > > "even if" Thank you. Will fix the grammer. > >> synchronous errors are queued as a memory_failure() work, and are >> executed within a kernel thread context, not the user-space process that >> encountered the corrupted memory on ARM64 platform. As a result, when >> kill_proc() is called to terminate the process, it sends the incorrect >> SIGBUS error code because the context in which it operates is not the >> one where the error was triggered. >> >> To this end, queue memory_failure() as a task_work so that it runs in >> the context of the process that is actually consuming the poisoned data, >> and it will send SIBBUS with si_code BUS_MCEERR_AR. > > SIGBUS Sorry, will fix the typo. > >> >> Signed-off-by: Shuai Xue >> Tested-by: Ma Wupeng >> Reviewed-by: Kefeng Wang >> Reviewed-by: Xiaofei Tan >> Reviewed-by: Baolin Wang >> --- >> drivers/acpi/apei/ghes.c | 77 +++++++++++++++++++++++----------------- >> include/acpi/ghes.h | 3 -- >> mm/memory-failure.c | 13 ------- >> 3 files changed, 44 insertions(+), 49 deletions(-) >> >> diff --git a/drivers/acpi/apei/ghes.c b/drivers/acpi/apei/ghes.c >> index 0892550732d4..e5086d795bee 100644 >> --- a/drivers/acpi/apei/ghes.c >> +++ b/drivers/acpi/apei/ghes.c >> @@ -465,28 +465,41 @@ static void ghes_clear_estatus(struct ghes *ghes, >> } >> >> /* >> - * Called as task_work before returning to user-space. >> - * Ensure any queued work has been done before we return to the context that >> - * triggered the notification. >> + * struct sync_task_work - for synchronous RAS event > > What's so special about it being a "sync_"? > > task_work is just fine and something else could use it too. You are right, the `sync_task_work` is only use for synchronous RAS event right, but it could be also use for other purpose in the future. The purpose can be specified through flags. I will remove the `sync_` prefix. > >> + * >> + * @twork: callback_head for task work >> + * @pfn: page frame number of corrupted page >> + * @flags: fine tune action taken > > s/fine tune action taken/work control flags/ > Will fix it. >> + * >> + * Structure to pass task work to be handled before >> + * ret_to_user via task_work_add(). > > What is "ret_to_user"? > > If this is an ARM thing, then make sure you explain stuff properly and > detailed. This driver is used by multiple architectures. It is not ARM specific thing. I mean it is used by task_work before returning to user-space. + * Structure to pass task work to be handled before + * returning to user-space via task_work_add(). > >> */ >> -static void ghes_kick_task_work(struct callback_head *head) >> +struct sync_task_work { >> + struct callback_head twork; >> + u64 pfn; >> + int flags; >> +}; >> + >> +static void memory_failure_cb(struct callback_head *twork) >> { >> - struct acpi_hest_generic_status *estatus; >> - struct ghes_estatus_node *estatus_node; >> - u32 node_len; >> + int ret; >> + struct sync_task_work *twcb = >> + container_of(twork, struct sync_task_work, twork); > > Ugly linebreak - no need for it. Will fix it. > >> - estatus_node = container_of(head, struct ghes_estatus_node, task_work); >> - if (IS_ENABLED(CONFIG_ACPI_APEI_MEMORY_FAILURE)) >> - memory_failure_queue_kick(estatus_node->task_work_cpu); >> + ret = memory_failure(twcb->pfn, twcb->flags); >> + gen_pool_free(ghes_estatus_pool, (unsigned long)twcb, sizeof(*twcb)); >> >> - estatus = GHES_ESTATUS_FROM_NODE(estatus_node); >> - node_len = GHES_ESTATUS_NODE_LEN(cper_estatus_len(estatus)); >> - gen_pool_free(ghes_estatus_pool, (unsigned long)estatus_node, node_len); >> + if (!ret || ret == -EHWPOISON || ret == -EOPNOTSUPP) >> + return; >> + >> + pr_err("Sending SIGBUS to current task due to memory error not recovered"); >> + force_sig(SIGBUS); >> } >> >> static bool ghes_do_memory_failure(u64 physical_addr, int flags) >> { >> unsigned long pfn; >> + struct sync_task_work *twcb; >> >> if (!IS_ENABLED(CONFIG_ACPI_APEI_MEMORY_FAILURE)) >> return false; >> @@ -499,6 +512,18 @@ static bool ghes_do_memory_failure(u64 physical_addr, int flags) >> return false; >> } >> >> + if (flags == MF_ACTION_REQUIRED && current->mm) { >> + twcb = (void *)gen_pool_alloc(ghes_estatus_pool, sizeof(*twcb)); >> + if (!twcb) >> + return false; >> + >> + twcb->pfn = pfn; >> + twcb->flags = flags; >> + init_task_work(&twcb->twork, memory_failure_cb); >> + task_work_add(current, &twcb->twork, TWA_RESUME); >> + return true; >> + } >> + >> memory_failure_queue(pfn, flags); >> return true; >> } >> @@ -746,7 +771,7 @@ int cxl_cper_unregister_callback(cxl_cper_callback callback) >> } >> EXPORT_SYMBOL_NS_GPL(cxl_cper_unregister_callback, CXL); >> >> -static bool ghes_do_proc(struct ghes *ghes, >> +static void ghes_do_proc(struct ghes *ghes, >> const struct acpi_hest_generic_status *estatus) >> { >> int sev, sec_sev; >> @@ -814,8 +839,6 @@ static bool ghes_do_proc(struct ghes *ghes, >> pr_err("Sending SIGBUS to current task due to memory error not recovered"); >> force_sig(SIGBUS); >> } >> - >> - return queued; >> } >> >> static void __ghes_print_estatus(const char *pfx, >> @@ -1117,9 +1140,7 @@ static void ghes_proc_in_irq(struct irq_work *irq_work) >> struct ghes_estatus_node *estatus_node; >> struct acpi_hest_generic *generic; >> struct acpi_hest_generic_status *estatus; >> - bool task_work_pending; >> u32 len, node_len; >> - int ret; >> >> llnode = llist_del_all(&ghes_estatus_llist); >> /* >> @@ -1134,25 +1155,16 @@ static void ghes_proc_in_irq(struct irq_work *irq_work) >> estatus = GHES_ESTATUS_FROM_NODE(estatus_node); >> len = cper_estatus_len(estatus); >> node_len = GHES_ESTATUS_NODE_LEN(len); >> - task_work_pending = ghes_do_proc(estatus_node->ghes, estatus); >> + >> + ghes_do_proc(estatus_node->ghes, estatus); >> + >> if (!ghes_estatus_cached(estatus)) { >> generic = estatus_node->generic; >> if (ghes_print_estatus(NULL, generic, estatus)) >> ghes_estatus_cache_add(generic, estatus); >> } >> - >> - if (task_work_pending && current->mm) { >> - estatus_node->task_work.func = ghes_kick_task_work; >> - estatus_node->task_work_cpu = smp_processor_id(); >> - ret = task_work_add(current, &estatus_node->task_work, >> - TWA_RESUME); >> - if (ret) >> - estatus_node->task_work.func = NULL; >> - } >> - >> - if (!estatus_node->task_work.func) >> - gen_pool_free(ghes_estatus_pool, >> - (unsigned long)estatus_node, node_len); > > I have no clue why this is being removed. Before this patch, a memory_failure() work is queued into workqueue for both the asynchronous interrupt and synchronous exception. So memory_failure() will be executed asynchronously. For NMIlike notifications, commit 7f17b4a121d0 ("ACPI: APEI: Kick the memory_failure() queue for synchronous errors") keeps track of whether memory_failure() work was queued, and makes task_work pending to flush out the queue. It ensures any queued work has been done before we return to the context that triggered the notification. In this patch: - a memory_failure() work is queued into workqueue for asynchronous interrupt - a memory_failure() task_work is queued by task_work_add for synchronous exception The memory_failure() task_work will be handled before returning to user space, so we does not need to queue a flushing task_work any anymore. > > Why doesn't a synchronous exception on ARM call into ghes_proc_in_irq()? /* * SEA can interrupt SError, mask it and describe this as an NMI so * that APEI defers the handling. */ local_daif_restore(DAIF_ERRCTX); nmi_enter(); => ghes_notify_sea => ghes_in_nmi_spool_from_list => ghes_in_nmi_queue_one_entry // also called in __ghes_sdei_callback => irq_work_queue(&ghes_proc_irq_work); nmi_exit(); > > That SDEI thing certainly does. > > Well looka here: > > 7f17b4a121d0 ("ACPI: APEI: Kick the memory_failure() queue for synchronous errors") > > that thing does exactly what you're trying to "fix". So why doesn't that > work for you? > Commit a70297d22132 (ACPI: APEI: set memory failure flags as MF_ACTION_REQUIRED on synchronous events) set MF_ACTION_REQUIRED for synchronous events. /* * Send all the processes who have the page mapped a signal. * ``action optional'' if they are not immediately affected by the error * ``action required'' if error happened in current execution context */ static int kill_proc(struct to_kill *tk, unsigned long pfn, int flags) { ... if ((flags & MF_ACTION_REQUIRED) && (t == current)) ret = force_sig_mceerr(BUS_MCEERR_AR, (void __user *)tk->addr, addr_lsb); else ret = send_sig_mceerr(BUS_MCEERR_AO, (void __user *)tk->addr, addr_lsb, t); ... } Because the memory_failure() running in a kthread context, the false branch in kill_proc() will send SIGBUS with BUS_MCEERR_AO. But we except it as a BUS_MCEERR_AR. Thank you for valuable comments :) Best Regards, Shuai