lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 11 Mar 2020 15:19:44 +0000
From:   <Austin.Bolen@...l.com>
To:     <helgaas@...nel.org>, <Austin.Bolen@...l.com>
CC:     <sathyanarayanan.kuppuswamy@...ux.intel.com>,
        <linux-pci@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
        <ashok.raj@...el.com>
Subject: Re: [PATCH v17 09/12] PCI/AER: Allow clearing Error Status Register
 in FF mode

On 3/11/2020 9:46 AM, Bjorn Helgaas wrote:
> 
> [EXTERNAL EMAIL]
> 
> On Tue, Mar 10, 2020 at 08:06:21PM +0000, Austin.Bolen@...l.com wrote:
>> On 3/10/2020 2:33 PM, Bjorn Helgaas wrote:
>>> On Tue, Mar 10, 2020 at 06:14:20PM +0000, Austin.Bolen@...l.com wrote:
>>>> On 3/9/2020 11:28 PM, Kuppuswamy, Sathyanarayanan wrote:
>>>>> On 3/9/2020 7:40 PM, Bjorn Helgaas wrote:
>>>>>> [+cc Austin, tentative Linux patches on this git branch:
>>>>>> https://git.kernel.org/pub/scm/linux/kernel/git/helgaas/pci.git/tree/drivers/pci/pcie?h=review/edr]
>>>>>>
>>>>>> On Tue, Mar 03, 2020 at 06:36:32PM -0800, sathyanarayanan.kuppuswamy@...ux.intel.com wrote:
>>>>>>> From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@...ux.intel.com>
>>>>>>>
>>>>>>> As per PCI firmware specification r3.2 System Firmware Intermediary
>>>>>>> (SFI) _OSC and DPC Updates ECR
>>>>>>> (https://members.pcisig.com/wg/PCI-SIG/document/13563), sec titled "DPC
>>>>>>> Event Handling Implementation Note", page 10, Error Disconnect Recover
>>>>>>> (EDR) support allows OS to handle error recovery and clearing Error
>>>>>>> Registers even in FF mode. So create new API pci_aer_raw_clear_status()
>>>>>>> which allows clearing AER registers without FF mode checks.
> 
>>>> OS clears the DPC Trigger Status bit which will bring port below it out
>>>> of containment. Then OS will clear the "port" error status bits (i.e.,
>>>> the AER and DPC status bits in the root port or downstream port that
>>>> triggered containment). I don't think it would hurt to do this two steps
>>>> in reverse order but don't think it is necessary.
> 
>>>> Note that error status bits for devices below the port in
>>>> containment are cleared later after f/w has a chance to log them.
> 
> Thanks for pointing out this wrinkle about devices below the port in
> containment.  I think we might have an issue here with the current
> series because evaluating _OST is the last thing the EDR notify
> handler does.  More below.
> 
>>> Maybe I'm misreading the DPC enhancements ECN.  I think it says the OS
>>> can read/write DPC registers until it clears the DPC Trigger Status.
>>> If the OS clears Trigger Status first, my understanding is that we're
>>> now out of the EDR notification processing window and the OS is not
>>> permitted to write DPC registers.
>>>
>>> If it's OK for the OS to clear Trigger Status before clearing DPC
>>> error status, what is the event that determines when the OS may no
>>> longer read/write the DPC registers?
>>
>> I think there are a few different registers to consider... DPC
>> Control, DPC Status, various AER registers, and the RP PIO
>> registers. At this point in the flow, the firmware has already had a
>> chance to read all of them and so it really doesn't matter the order
>> the OS does those two things. The firmware isn't going to get
>> notified again until _OST so by then both operation will be done and
>> system firmware will have no idea which order the OS did them in,
>> nor will it care.  But since the existing normative text specifies
>> and order, I would just follow that.
> 
> OK, this series clears DPC error status before clearing DPC Trigger
> Status, so I think we can keep that as-is.
> 
>>> There are no events after the "clear device AER status" box.  That
>>> seems to mean the OS can write the AER status registers at any
>>> time.  But the whole implementation note assumes firmware
>>> maintains control of AER.
>>
>> In this model the OS doesn't own DPC or AER but the model allows OS
>> to touch both DPC and AER registers at certain times.  I would view
>> ownership in this case as who is the primary owner and not who is
>> the sole entity allowed to access the registers.
> 
> I'm not sure how to translate the idea of primary ownership into code.

I would just add text that said when it's ok for OS to touch these bits 
even when they don't own them similar to what's done for the DPC bits.

> 
>> For the normative text describing when OS clears the AER bits
>> following the informative flow chart, it could say that OS clears
>> AER as soon as possible after OST returns and before OS processes
>> _HPX and loading drivers.  Open to other suggestions as well.
> 
> I'm not sure what to do with "as soon as possible" either.  That
> doesn't seem like something firmware and the OS can agree on.
> 

I can just state that it's done after OST returns but before _HPX or 
driver is loaded. Any time in that range is fine. I can't get super 
specific here because different OSes do different things.  Even for a 
given OS they change over time. And I need something generic enough to 
support a wide variety of OS implementations.

> For the port that triggered DPC containment, I think the easiest thing
> to understand and implement would be to allow AER access during the
> same EDR processing window where DPC access is allowed.
Agreed.

> 
> For child devices of that port, obviously it's impossible to access
> AER registers until DPC Trigger Status is cleared, and the flowchart
> says the OS shouldn't access them until after _OST.
> 
> I'm actually not sure we currently do *anything* with child device AER
> info in the EDR path.  pcie_do_recovery() does walk the sub-hierarchy
> of child devices, but it only calls error handling callbacks in the
> child drivers; it doesn't do anything with the child AER registers
> itself.  And of course, this happens before _OST, so it would be too
> early in any case.  But maybe I'm missing something here.

My understanding is that the OS read/clears AER in the case where OS has 
native control of AER.  Feedback from OSVs is they wanted to continue to 
do that to keep the native OS controlled AER and FF mechanism similar. 
The other way we could have done it would be to have the firmware 
read/clear AER and report them to OS via APEI.

> 
> BTW, if/when this is updated, I have another question: the _OSC DPC
> control bit currently allows the OS to write DPC Control during that
> window.  I understand the OS writing the RW1C *Status* bits to clear
> them, but it seems like writing the DPC Control register is likely to
> cause issues.  The same question would apply to the AER access we're
> talking about.

We could specify which particular bits can and can't be touched.  But 
it's hard to maintain as new bits are added.  Probably better to add 
some guidance that OS should read/clear error status, DPC Trigger 
Status, etc. but shouldn't change masks/severity/control bits/etc.

> 
> Bjorn
> 

Powered by blists - more mailing lists