From: Xie XiuQi <xiexiuqi@huawei.com>
To: James Morse <james.morse@arm.com>
Cc: catalin.marinas@arm.com, will.deacon@arm.com, mingo@redhat.com,
mark.rutland@arm.com, ard.biesheuvel@linaro.org,
Dave.Martin@arm.com, takahiro.akashi@linaro.org,
tbaicar@codeaurora.org, stephen.boyd@linaro.org, bp@suse.de,
julien.thierry@arm.com, shiju.jose@huawei.com,
zjzhang@codeaurora.org, linux-arm-kernel@lists.infradead.org,
linux-kernel@vger.kernel.org, linux-acpi@vger.kernel.org,
wangxiongfeng2@huawei.com, zhengqiang10@huawei.com,
gengdongjiu@huawei.com, huawei.libin@huawei.com,
wangkefeng.wang@huawei.com, lijinyue@huawei.com,
guohanjun@huawei.com, cj.chengjian@huawei.com
Subject: Re: [PATCH v3 1/3] arm64/ras: support sea error recovery
Date: Wed, 20 Sep 2017 21:34:57 +0800 [thread overview]
Message-ID: <2b540452-2fa6-322a-e7ee-63a0653b8548@huawei.com> (raw)
In-Reply-To: <59BC1CEE.8010708@arm.com>
Hi James,
I try to explain some of following questions.
On 2017/9/16 2:33, James Morse wrote:
> Hi Xie XiuQi,
>
> On 11/09/17 15:11, Xie XiuQi wrote:
>> I first describe the approach of this patchset:
>>
>> A memory access error on the execution path usually triggers SEA.
>> According to the existing process, errors occurred in the kernel,
>> leading to direct panic, if it occurred the user-space, we should
>> just kill process.
>>
>> But there is a class of error, in fact, is not necessary to kill
>> process, you can recover and continue to run the process. Such as
>> the instruction data corrupted, where the memory page might be
>> read-only, which is has not been modified, the disk might have the
>> correct data, so you can directly drop the page, ant reload it when
>> necessary.
>>
>> So this patchset is just try to solve such problem: if the error is
>> consumed in user-space and the error occurs on a clean page, you can
>> directly drop the memory page without killing process.
>>
>> This is implemented in memory_failure, which is generic process.
>
>> The error reported by SEA should be handled before re-enter the process,
>> or we must kill the process to prevent error propagation.
>>
>> memory_failure_queue() is asynchronous, in which, error info was saved
>> at ghes_proc, but handled in kworker. During this period there is a context
>> switching, so we can not determine which process would be switch to. So
>> memory_failure_queue is not suitable for handling the problem.
>
> Thanks for this summary. I see the problem you're trying to solve is when
> memory_failure() runs, in your scenario its not guaranteed to run before we
> return to user space.
>
> What is the user-visible symptom of this? SIGBUS, code=0 instead of SIGBUS,
> code=...MCEERR_A?
If the corrupted page is clean, just dropped it and return to user-space without
side effects. And if corrupted page is dirty, memory_failure() will send SIGBUS
with code=BUS_MCEERR_AR.
>
> ..in which case I'm looking at this as a race with the memory_failure() bottom
> half via schedule_work().
Do you mean there is a race between memory_failure() from do_notify_resume() and
from schedule_work()? Indeed there a race here, thank you for pointing out that.
Actually, memory_failure_queue() is not needed in SEA case if we process it in
synchronous.
I'll try to solve this issue later.
>
> How does x86 avoid this same problem?
>
>
>> And memory_failure is not nmi-safe, so it can not be called directly in the
>> SEA context. So we just handle this error at SEA exit path, and before context
>> switching.
>
> (I need to look more into which locks memory_failure() is taking)
>
>
>> In FFH mode, physical address can only be obtained by parsing the GHES table.
>> But we only care about SEA, so the error handling is tied to the type of notification.
>
> I care about all the notification methods. Once the notification has been passed
> to APEI I want them to behave the same so that we don't have subtle bugs between
> the 11 different ways we could get a notification. This code is rarely tested
> enough as it is.
>
>>From the arch code I just want to call out to APEI asking 'is this yours?'. If
> so I expect APEI to have done all the work, if not we take the v8.0 behaviour.
>
>
> Here you need APEI and the arch code to spot 'SEA' and treat it differently,
> invoking some arm64-specific behaviour for APEI, and some
> not-really-arch-specific code under /arch/arm64. There is nothing arm64 specific
> about your arm_process_error(), how come the core APEI code doesn't need to do this?
>
>
> I think this is caused by the way memory_failure() schedules its work, and that
> is where I'd like to try and fix this, so that its the same for all notification
> methods and all (cough: both) architectures.
I try to see if there is a better way.
>
>
>> The TIF flag is checked on a generic path, but it will only be set when SEA occurs.
>> And if we use unlikely optimization, it should have little impact on performance.
>
> Yes, the arch code checks _TIF_WORK_MASK in one go so there is no performance
> problem for code that hasn't taken the RAS-Error. (and once we've taken a RAS
> error performance is out the window!)
>
>> And the TIF flag approach was used on x86 platform for years, until commit d4812e169d
>
> ... so x86 doesn't do this ...
>
>> (x86, mce: Get rid of TIF_MCE_NOTIFY and associated mce tricks)[0]. On currently arm64
>> platform, there is no IST interrupt[1] function, so we could not call memory_failure
>> directly in SEA context. So the way to use TIF notification, is also a good choice,
>> after all, the same way on x86 platform is verified.
>
> Thanks, looks like I need to read more of the history of x86's kernel-first
> handling...
>
>
> Thanks,
>
> James
>
>
> .
>
--
Thanks,
Xie XiuQi
next prev parent reply other threads:[~2017-09-20 13:35 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-09-07 7:45 [PATCH v3 0/3] arm64/ras: support sea error recovery Xie XiuQi
2017-09-07 7:45 ` [PATCH v3 1/3] " Xie XiuQi
2017-09-08 9:02 ` Borislav Petkov
2017-09-08 18:15 ` James Morse
2017-09-11 1:56 ` Xiongfeng Wang
2017-09-11 14:11 ` Xie XiuQi
2017-09-15 18:33 ` James Morse
2017-09-20 13:34 ` Xie XiuQi [this message]
2017-09-27 12:42 ` Xie XiuQi
2017-09-07 7:45 ` [PATCH v3 2/3] GHES: add a notify chain for process memory section Xie XiuQi
2017-09-07 7:45 ` [PATCH v3 3/3] arm64/ras: save error address from memory section for recovery Xie XiuQi
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2b540452-2fa6-322a-e7ee-63a0653b8548@huawei.com \
--to=xiexiuqi@huawei.com \
--cc=Dave.Martin@arm.com \
--cc=ard.biesheuvel@linaro.org \
--cc=bp@suse.de \
--cc=catalin.marinas@arm.com \
--cc=cj.chengjian@huawei.com \
--cc=gengdongjiu@huawei.com \
--cc=guohanjun@huawei.com \
--cc=huawei.libin@huawei.com \
--cc=james.morse@arm.com \
--cc=julien.thierry@arm.com \
--cc=lijinyue@huawei.com \
--cc=linux-acpi@vger.kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mark.rutland@arm.com \
--cc=mingo@redhat.com \
--cc=shiju.jose@huawei.com \
--cc=stephen.boyd@linaro.org \
--cc=takahiro.akashi@linaro.org \
--cc=tbaicar@codeaurora.org \
--cc=wangkefeng.wang@huawei.com \
--cc=wangxiongfeng2@huawei.com \
--cc=will.deacon@arm.com \
--cc=zhengqiang10@huawei.com \
--cc=zjzhang@codeaurora.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox