From: alison.schofield@intel.com
To: Vishal Verma <vishal.l.verma@intel.com>
Cc: Alison Schofield <alison.schofield@intel.com>,
nvdimm@lists.linux.dev, linux-cxl@vger.kernel.org
Subject: [PATCH v6 5/7] cxl/list: collect and parse media_error records
Date: Wed, 17 Jan 2024 16:28:04 -0800 [thread overview]
Message-ID: <17f5eccf769f97b7d2450890a5a185eaaf69be32.1705534719.git.alison.schofield@intel.com> (raw)
In-Reply-To: <cover.1705534719.git.alison.schofield@intel.com>
From: Alison Schofield <alison.schofield@intel.com>
Media_error records are logged as events in the kernel tracing
subsystem. To prepare the media_error records for cxl list, enable
tracing, trigger the poison list read, and parse the generated
cxl_poison events into a json representation.
Use the event_trace private parsing option to customize the json
representation based on cxl-list calling options and event field
settings.
Signed-off-by: Alison Schofield <alison.schofield@intel.com>
---
cxl/json.c | 218 +++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 218 insertions(+)
diff --git a/cxl/json.c b/cxl/json.c
index 7678d02020b6..abe77e1f86d3 100644
--- a/cxl/json.c
+++ b/cxl/json.c
@@ -1,16 +1,20 @@
// SPDX-License-Identifier: GPL-2.0
// Copyright (C) 2015-2021 Intel Corporation. All rights reserved.
#include <limits.h>
+#include <errno.h>
#include <util/json.h>
+#include <util/bitmap.h>
#include <uuid/uuid.h>
#include <cxl/libcxl.h>
#include <json-c/json.h>
#include <json-c/printbuf.h>
#include <ccan/short_types/short_types.h>
+#include <tracefs/tracefs.h>
#include "filter.h"
#include "json.h"
#include "../daxctl/json.h"
+#include "event_trace.h"
#define CXL_FW_VERSION_STR_LEN 16
#define CXL_FW_MAX_SLOTS 4
@@ -571,6 +575,208 @@ err_jobj:
return NULL;
}
+/* CXL Spec 3.1 Table 8-140 Media Error Record */
+#define CXL_POISON_SOURCE_UNKNOWN 0
+#define CXL_POISON_SOURCE_EXTERNAL 1
+#define CXL_POISON_SOURCE_INTERNAL 2
+#define CXL_POISON_SOURCE_INJECTED 3
+#define CXL_POISON_SOURCE_VENDOR 7
+
+/* CXL Spec 3.1 Table 8-139 Get Poison List Output Payload */
+#define CXL_POISON_FLAG_MORE BIT(0)
+#define CXL_POISON_FLAG_OVERFLOW BIT(1)
+#define CXL_POISON_FLAG_SCANNING BIT(2)
+
+struct poison_event_ctx {
+ struct json_object *jpoison;
+ const char *region_name;
+ unsigned long flags;
+};
+
+int poison_event_to_json(struct tep_event *event, struct tep_record *record,
+ void *ctx)
+{
+ struct poison_event_ctx *p_ctx = (struct poison_event_ctx *)ctx;
+ struct json_object *jobj, *jp, *jpoison = p_ctx->jpoison;
+ const char *region_name = p_ctx->region_name;
+ unsigned long flags = p_ctx->flags;
+ bool overflow = false;
+ unsigned char *data;
+ int pflags;
+ char *str;
+
+ jp = json_object_new_object();
+ if (!jp)
+ return -ENOMEM;
+
+ str = cxl_get_field_string(event, record, "region");
+
+ /* Skip records not in this region when listing by region */
+ if ((region_name) && (strcmp(region_name, str) != 0)) {
+ json_object_put(jp);
+ return 0;
+ }
+ /* Only display region name in by memdev listings */
+ if (!region_name && strlen(str)) {
+ jobj = json_object_new_string(str);
+ if (jobj)
+ json_object_object_add(jp, "region", jobj);
+ }
+ /* Only display memdev name in by region listings */
+ if (region_name) {
+ str = cxl_get_field_string(event, record, "memdev");
+ jobj = json_object_new_string(str);
+ if (jobj)
+ json_object_object_add(jp, "memdev", jobj);
+ }
+
+ data = cxl_get_field_data(event, record, "dpa");
+ jobj = util_json_object_hex(*(uint64_t *)data, flags);
+ if (jobj)
+ json_object_object_add(jp, "dpa", jobj);
+
+ data = cxl_get_field_data(event, record, "dpa_length");
+ jobj = util_json_object_size(*(uint32_t *)data, flags);
+ if (jobj)
+ json_object_object_add(jp, "dpa_length", jobj);
+
+ data = cxl_get_field_data(event, record, "hpa");
+ if (*(uint64_t *)data != ULLONG_MAX) {
+ jobj = util_json_object_hex(*(uint64_t *)data, flags);
+ if (jobj)
+ json_object_object_add(jp, "hpa", jobj);
+ }
+
+ str = cxl_get_field_string(event, record, "source");
+ switch (*(uint8_t *)str) {
+ case CXL_POISON_SOURCE_UNKNOWN:
+ jobj = json_object_new_string("Unknown");
+ break;
+ case CXL_POISON_SOURCE_EXTERNAL:
+ jobj = json_object_new_string("External");
+ break;
+ case CXL_POISON_SOURCE_INTERNAL:
+ jobj = json_object_new_string("Internal");
+ break;
+ case CXL_POISON_SOURCE_INJECTED:
+ jobj = json_object_new_string("Injected");
+ break;
+ case CXL_POISON_SOURCE_VENDOR:
+ jobj = json_object_new_string("Vendor");
+ break;
+ default:
+ jobj = json_object_new_string("Reserved");
+ }
+ json_object_object_add(jp, "source", jobj);
+
+ str = cxl_get_field_string(event, record, "flags");
+ pflags = *(uint8_t *)str;
+ if (pflags) {
+ char flag_str[32] = { '\0' };
+
+ if (pflags & CXL_POISON_FLAG_MORE)
+ strcat(flag_str, "More,");
+ if (pflags & CXL_POISON_FLAG_SCANNING)
+ strcat(flag_str, "Scanning,");
+ if (pflags & CXL_POISON_FLAG_OVERFLOW) {
+ strcat(flag_str, "Overflow,");
+ overflow = true;
+ }
+ jobj = json_object_new_string(flag_str);
+ if (jobj)
+ json_object_object_add(jp, "flags", jobj);
+ }
+ if (overflow) {
+ data = cxl_get_field_data(event, record, "overflow_ts");
+ jobj = util_json_object_hex(*(uint64_t *)data, flags);
+ if (jobj)
+ json_object_object_add(jp, "overflow_t", jobj);
+ }
+
+ json_object_array_add(jpoison, jp);
+
+ return 0;
+}
+
+static struct json_object *
+util_cxl_poison_events_to_json(struct tracefs_instance *inst,
+ const char *region_name, unsigned long flags)
+{
+ struct poison_event_ctx p_ctx = {
+ .region_name = region_name,
+ .flags = flags,
+ };
+ struct event_ctx ectx = {
+ .event_name = "cxl_poison",
+ .event_pid = getpid(),
+ .system = "cxl",
+ .private_ctx = &p_ctx,
+ .parse_event = poison_event_to_json,
+ };
+ int rc = 0;
+
+ p_ctx.jpoison = json_object_new_array();
+ if (!p_ctx.jpoison)
+ return NULL;
+
+ rc = cxl_parse_events(inst, &ectx);
+ if (rc < 0) {
+ fprintf(stderr, "Failed to parse events: %d\n", rc);
+ json_object_put(p_ctx.jpoison);
+ return NULL;
+ }
+
+ if (json_object_array_length(p_ctx.jpoison) == 0) {
+ json_object_put(p_ctx.jpoison);
+ return NULL;
+ }
+
+ return p_ctx.jpoison;
+}
+
+static struct json_object *
+util_cxl_poison_list_to_json(struct cxl_region *region,
+ struct cxl_memdev *memdev,
+ unsigned long flags)
+{
+ struct json_object *jpoison = NULL;
+ struct tracefs_instance *inst;
+ const char *region_name;
+ int rc;
+
+ inst = tracefs_instance_create("cxl list");
+ if (!inst) {
+ fprintf(stderr, "tracefs_instance_create() failed\n");
+ return NULL;
+ }
+
+ rc = cxl_event_tracing_enable(inst, "cxl", "cxl_poison");
+ if (rc < 0) {
+ fprintf(stderr, "Failed to enable trace: %d\n", rc);
+ goto err_free;
+ }
+
+ if (region)
+ rc = cxl_region_trigger_poison_list(region);
+ else
+ rc = cxl_memdev_trigger_poison_list(memdev);
+ if (rc)
+ goto err_free;
+
+ rc = cxl_event_tracing_disable(inst);
+ if (rc < 0) {
+ fprintf(stderr, "Failed to disable trace: %d\n", rc);
+ goto err_free;
+ }
+
+ region_name = region ? cxl_region_get_devname(region) : NULL;
+ jpoison = util_cxl_poison_events_to_json(inst, region_name, flags);
+
+err_free:
+ tracefs_instance_free(inst);
+ return jpoison;
+}
+
struct json_object *util_cxl_memdev_to_json(struct cxl_memdev *memdev,
unsigned long flags)
{
@@ -649,6 +855,12 @@ struct json_object *util_cxl_memdev_to_json(struct cxl_memdev *memdev,
json_object_object_add(jdev, "firmware", jobj);
}
+ if (flags & UTIL_JSON_MEDIA_ERRORS) {
+ jobj = util_cxl_poison_list_to_json(NULL, memdev, flags);
+ if (jobj)
+ json_object_object_add(jdev, "media_errors", jobj);
+ }
+
json_object_set_userdata(jdev, memdev, NULL);
return jdev;
}
@@ -987,6 +1199,12 @@ struct json_object *util_cxl_region_to_json(struct cxl_region *region,
json_object_object_add(jregion, "state", jobj);
}
+ if (flags & UTIL_JSON_MEDIA_ERRORS) {
+ jobj = util_cxl_poison_list_to_json(region, NULL, flags);
+ if (jobj)
+ json_object_object_add(jregion, "media_errors", jobj);
+ }
+
util_cxl_mappings_append_json(jregion, region, flags);
if (flags & UTIL_JSON_DAX) {
--
2.37.3
next prev parent reply other threads:[~2024-01-18 0:28 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-01-18 0:27 [ndctl PATCH v6 0/7] Support poison list retrieval alison.schofield
2024-01-18 0:28 ` [PATCH v6 1/7] libcxl: add interfaces for GET_POISON_LIST mailbox commands alison.schofield
2024-01-19 18:32 ` Dave Jiang
2024-01-18 0:28 ` [PATCH v6 2/7] cxl: add an optional pid check to event parsing alison.schofield
2024-01-19 18:35 ` Dave Jiang
2024-01-18 0:28 ` [PATCH v6 3/7] cxl/event_trace: add a private context for private parsers alison.schofield
2024-01-19 21:08 ` Dave Jiang
2024-01-18 0:28 ` [PATCH v6 4/7] cxl/event_trace: add helpers get_field_[string|data]() alison.schofield
2024-01-19 21:18 ` Dave Jiang
2024-01-18 0:28 ` alison.schofield [this message]
2024-01-18 0:28 ` [PATCH v6 6/7] cxl/list: add --media-errors option to cxl list alison.schofield
2024-01-18 0:28 ` [PATCH v6 7/7] cxl/test: add cxl-poison.sh unit test alison.schofield
2024-01-18 21:56 ` [ndctl PATCH v6 0/7] Support poison list retrieval Dan Williams
2024-01-18 23:34 ` Alison Schofield
2024-01-18 23:55 ` Dan Williams
2024-02-07 22:54 ` Alison Schofield
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=17f5eccf769f97b7d2450890a5a185eaaf69be32.1705534719.git.alison.schofield@intel.com \
--to=alison.schofield@intel.com \
--cc=linux-cxl@vger.kernel.org \
--cc=nvdimm@lists.linux.dev \
--cc=vishal.l.verma@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox