From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5A18D1BDCC; Mon, 15 Jan 2024 23:25:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="RdmgxUTx" Received: by smtp.kernel.org (Postfix) with ESMTPSA id E0E34C433C7; Mon, 15 Jan 2024 23:25:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1705361147; bh=foiJjfDXSHgeJu4rXvZQ2haMWR0V4dhnE3D0sDjriHQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RdmgxUTxLfq49hLj3hpblK7uupcZuS260RpdALyJi98ZhgroJAQBscYUCLb7XbEk9 KgrSjDZ8631/bMsu4CSy27D7LyxX3kPC0qVsszhZuwte26NyqhUefeTUE3BHYAt4Cj suVaNC7Q9L+qmxGn5670lL6HcbOtDeEN0UdnNhub4B0ddaT2taB/ngAk7x38Lz3nLa Q813Deo3A7s6bYkH+3Ejmx0V/AJhzs2f+5Vp/vD+kVT1Lyf+kEmaVTYRSImJ8FHMnB d2zqECTYOYe9lEgTYVVPb/uGzqalLrp7l3b118awpGyyGUD6SrN3D8PwblFRw653Dj qWdfS+ufI5tkA== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Zhiquan Li , Youquan Song , Borislav Petkov , Naoya Horiguchi , Sasha Levin , tglx@linutronix.de, mingo@redhat.com, dave.hansen@linux.intel.com, x86@kernel.org, linux-edac@vger.kernel.org Subject: [PATCH AUTOSEL 6.6 14/14] x86/mce: Mark fatal MCE's page as poison to avoid panic in the kdump kernel Date: Mon, 15 Jan 2024 18:24:37 -0500 Message-ID: <20240115232501.208889-14-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240115232501.208889-1-sashal@kernel.org> References: <20240115232501.208889-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-edac@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 6.6.12 Content-Transfer-Encoding: 8bit From: Zhiquan Li [ Upstream commit 9f3b130048bfa2e44a8cfb1b616f826d9d5d8188 ] Memory errors don't happen very often, especially fatal ones. However, in large-scale scenarios such as data centers, that probability increases with the amount of machines present. When a fatal machine check happens, mce_panic() is called based on the severity grading of that error. The page containing the error is not marked as poison. However, when kexec is enabled, tools like makedumpfile understand when pages are marked as poison and do not touch them so as not to cause a fatal machine check exception again while dumping the previous kernel's memory. Therefore, mark the page containing the error as poisoned so that the kexec'ed kernel can avoid accessing the page. [ bp: Rewrite commit message and comment. ] Co-developed-by: Youquan Song Signed-off-by: Youquan Song Signed-off-by: Zhiquan Li Signed-off-by: Borislav Petkov (AMD) Reviewed-by: Naoya Horiguchi Link: https://lore.kernel.org/r/20231014051754.3759099-1-zhiquan1.li@intel.com Signed-off-by: Sasha Levin --- arch/x86/kernel/cpu/mce/core.c | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/arch/x86/kernel/cpu/mce/core.c b/arch/x86/kernel/cpu/mce/core.c index 6f35f724cc14..20ab11aec60b 100644 --- a/arch/x86/kernel/cpu/mce/core.c +++ b/arch/x86/kernel/cpu/mce/core.c @@ -44,6 +44,7 @@ #include #include #include +#include #include #include @@ -233,6 +234,7 @@ static noinstr void mce_panic(const char *msg, struct mce *final, char *exp) struct llist_node *pending; struct mce_evt_llist *l; int apei_err = 0; + struct page *p; /* * Allow instrumentation around external facilities usage. Not that it @@ -286,6 +288,20 @@ static noinstr void mce_panic(const char *msg, struct mce *final, char *exp) if (!fake_panic) { if (panic_timeout == 0) panic_timeout = mca_cfg.panic_timeout; + + /* + * Kdump skips the poisoned page in order to avoid + * touching the error bits again. Poison the page even + * if the error is fatal and the machine is about to + * panic. + */ + if (kexec_crash_loaded()) { + if (final && (final->status & MCI_STATUS_ADDRV)) { + p = pfn_to_online_page(final->addr >> PAGE_SHIFT); + if (p) + SetPageHWPoison(p); + } + } panic(msg); } else pr_emerg(HW_ERR "Fake kernel panic: %s\n", msg); -- 2.43.0