[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a0839ff9-ea8d-44b9-8289-fcd5039e9263@linux.alibaba.com>
Date: Wed, 30 Jul 2025 21:50:39 +0800
From: Shuai Xue <xueshuai@...ux.alibaba.com>
To: Breno Leitao <leitao@...ian.org>
Cc: Tony Luck <tony.luck@...el.com>, Borislav Petkov <bp@...en8.de>,
"Rafael J. Wysocki" <rafael@...nel.org>, Len Brown <lenb@...nel.org>,
James Morse <james.morse@....com>, Robert Moore <robert.moore@...el.com>,
Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>,
Dave Hansen <dave.hansen@...ux.intel.com>, x86@...nel.org,
"H. Peter Anvin" <hpa@...or.com>, Hanjun Guo <guohanjun@...wei.com>,
Mauro Carvalho Chehab <mchehab@...nel.org>,
Mahesh J Salgaonkar <mahesh@...ux.ibm.com>,
Oliver O'Halloran <oohall@...il.com>, Bjorn Helgaas <bhelgaas@...gle.com>,
linux-acpi@...r.kernel.org, linux-kernel@...r.kernel.org,
acpica-devel@...ts.linux.dev, osandov@...ndov.com, konrad.wilk@...cle.com,
linux-edac@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org,
linux-pci@...r.kernel.org, kernel-team@...a.com
Subject: Re: [PATCH v3] vmcoreinfo: Track and log recoverable hardware errors
在 2025/7/30 21:11, Breno Leitao 写道:
> Hello Shuai,
>
> On Wed, Jul 30, 2025 at 10:13:13AM +0800, Shuai Xue wrote:
>> In ghes_log_hwerr(), you're counting both CPER_SEV_CORRECTED and
>> CPER_SEV_RECOVERABLE errors:
>
> Thanks. I was reading this code a bit more, and I want to make sure my
> understanding is correct, giving I was confused about CORRECTED and
> RECOVERABLE errors.
>
> CPER_SEV_CORRECTED means it is corrected in the background, and the OS
> was not even notified about it. That includes 1-bit ECC error.
Not quite correct. From ACPI spec:
> A corrected error is a hardware error condition that has been
> corrected by the hardware or by the firmware by the time the OSPM is
> notified about the existence of the error condition.
For example, 1-bit ECC errors can be reported via CMCI interrupt when
the threshold of correctable errors exceeds the desired limit. The Linux
GHES driver then initiates kernel actions like soft-offlining pages.
> THose are not the errors we are interested in, since they are irrelavant
> to the OS.
>
> If that is true, then I might not want count CPER_SEV_CORRECTED errors
> at all, but only CPER_SEV_RECOVERABLE.
Yes, that's the right approach. Hardware corrects CE errors and software
can continue running without intervention. Since HWERR_RECOV_MCE only
records uncorrected errors, focusing on CPER_SEV_RECOVERABLE is more
appropriate for crash correlation analysis.
>
>> However, in the AER section, you're only handling AER_CORRECTABLE cases.
>> IMHO, Non-fatal errors are recoverable and correspond to
>> CPER_SEV_RECOVERABLE in the ACPI context.
>>
>> The mapping should probably be:
>>
>> - AER_CORRECTABLE → CPER_SEV_CORRECTED
>> - AER_NONFATAL → CPER_SEV_RECOVERABLE
>
> Thanks. This means I want to count AER_NONFATAL but not AER_CORRECTABLE.
> Is this right?
Exactly. IMHO, the updated mapping looks correct:
- GHES: Only CPER_SEV_RECOVERABLE
- AER: Only AER_NONFATAL (which maps to recoverable errors)
- MCE: Uncorrected errors that didn't cause panic
>
> Summarizing, This is the a new version of the change, according to my
> new understanding:
>
> commit deca1c4b99dcfa64b29fe035f8422b4601212413
> Author: Breno Leitao <leitao@...ian.org>
> Date: Thu Jul 17 07:39:26 2025 -0700
>
> vmcoreinfo: Track and log recoverable hardware errors
>
> Introduce a generic infrastructure for tracking recoverable hardware
> errors (HW errors that are visible to the OS but does not cause a panic)
> and record them for vmcore consumption. This aids post-mortem crash
> analysis tools by preserving a count and timestamp for the last
> occurrence of such errors. On the other side, correctable errors, which
> the OS typically remains unaware of because the underlying hardware
> handles them transparently, are less relevant and therefore are NOT
> tracked in this infrastructure.
>
> Add centralized logging for sources of recoverable hardware
> errors based on the subsystem it has been notified.
>
> hwerror_data is write-only at kernel runtime, and it is meant to be read
> from vmcore using tools like crash/drgn. For example, this is how it
> looks like when opening the crashdump from drgn.
>
> >>> prog['hwerror_data']
> (struct hwerror_info[6]){
> {
> .count = (int)844,
> .timestamp = (time64_t)1752852018,
> },
> ...
>
> This helps fleet operators quickly triage whether a crash may be
> influenced by hardware recoverable errors (which executes a uncommon
> code path in the kernel), especially when recoverable errors occurred
> shortly before a panic, such as the bug fixed by
> commit ee62ce7a1d90 ("page_pool: Track DMA-mapped pages and unmap them
> when destroying the pool")
>
> This is not intended to replace full hardware diagnostics but provides
> a fast way to correlate hardware events with kernel panics quickly.
>
> Suggested-by: Tony Luck <tony.luck@...el.com>
> Signed-off-by: Breno Leitao <leitao@...ian.org>
>
> diff --git a/arch/x86/kernel/cpu/mce/core.c b/arch/x86/kernel/cpu/mce/core.c
> index 4da4eab56c81d..f85759453f89a 100644
> --- a/arch/x86/kernel/cpu/mce/core.c
> +++ b/arch/x86/kernel/cpu/mce/core.c
> @@ -45,6 +45,7 @@
> #include <linux/task_work.h>
> #include <linux/hardirq.h>
> #include <linux/kexec.h>
> +#include <linux/vmcore_info.h>
>
> #include <asm/fred.h>
> #include <asm/cpu_device_id.h>
> @@ -1690,6 +1691,9 @@ noinstr void do_machine_check(struct pt_regs *regs)
> }
>
> out:
> + /* Given it didn't panic, mark it as recoverable */
> + hwerr_log_error_type(HWERR_RECOV_MCE);
> +
Indentation: needs tab alignment.
The current placement only logs errors that reach the out: label. Errors
that go to `clear` lable won't be recorded. Would it be better to log at
the beginning of do_machine_check() to capture all recoverable MCEs?
> instrumentation_end();
>
> clear:
> diff --git a/drivers/acpi/apei/ghes.c b/drivers/acpi/apei/ghes.c
> index a0d54993edb3b..9c549c4a1a708 100644
> --- a/drivers/acpi/apei/ghes.c
> +++ b/drivers/acpi/apei/ghes.c
> @@ -43,6 +43,7 @@
> #include <linux/uuid.h>
> #include <linux/ras.h>
> #include <linux/task_work.h>
> +#include <linux/vmcore_info.h>
>
> #include <acpi/actbl1.h>
> #include <acpi/ghes.h>
> @@ -867,6 +868,40 @@ int cxl_cper_kfifo_get(struct cxl_cper_work_data *wd)
> }
> EXPORT_SYMBOL_NS_GPL(cxl_cper_kfifo_get, "CXL");
>
> +static void ghes_log_hwerr(int sev, guid_t *sec_type)
> +{
> + if (sev != CPER_SEV_RECOVERABLE)
> + return;
> +
> + if (guid_equal(sec_type, &CPER_SEC_PROC_ARM) ||
> + guid_equal(sec_type, &CPER_SEC_PROC_GENERIC) ||
> + guid_equal(sec_type, &CPER_SEC_PROC_IA)) {
> + hwerr_log_error_type(HWERR_RECOV_CPU);
> + return;
> + }
> +
> + if (guid_equal(sec_type, &CPER_SEC_CXL_PROT_ERR) ||
> + guid_equal(sec_type, &CPER_SEC_CXL_GEN_MEDIA_GUID) ||
> + guid_equal(sec_type, &CPER_SEC_CXL_DRAM_GUID) ||
> + guid_equal(sec_type, &CPER_SEC_CXL_MEM_MODULE_GUID)) {
> + hwerr_log_error_type(HWERR_RECOV_CXL);
> + return;
> + }
> +
> + if (guid_equal(sec_type, &CPER_SEC_PCIE) ||
> + guid_equal(sec_type, &CPER_SEC_PCI_X_BUS) {
> + hwerr_log_error_type(HWERR_RECOV_PCI);
> + return;
> + }
> +
> + if (guid_equal(sec_type, &CPER_SEC_PLATFORM_MEM)) {
> + hwerr_log_error_type(HWERR_RECOV_MEMORY);
> + return;
> + }
> +
> + hwerr_log_error_type(HWERR_RECOV_OTHERS);
> +}
> +
> static void ghes_do_proc(struct ghes *ghes,
> const struct acpi_hest_generic_status *estatus)
> {
> @@ -888,6 +923,7 @@ static void ghes_do_proc(struct ghes *ghes,
> if (gdata->validation_bits & CPER_SEC_VALID_FRU_TEXT)
> fru_text = gdata->fru_text;
>
> + ghes_log_hwerr(sev, sec_type);
> if (guid_equal(sec_type, &CPER_SEC_PLATFORM_MEM)) {
> struct cper_sec_mem_err *mem_err = acpi_hest_get_payload(gdata);
>
> diff --git a/drivers/pci/pcie/aer.c b/drivers/pci/pcie/aer.c
> index e286c197d7167..d814c06cdbee6 100644
> --- a/drivers/pci/pcie/aer.c
> +++ b/drivers/pci/pcie/aer.c
> @@ -30,6 +30,7 @@
> #include <linux/kfifo.h>
> #include <linux/ratelimit.h>
> #include <linux/slab.h>
> +#include <linux/vmcore_info.h>
> #include <acpi/apei.h>
> #include <acpi/ghes.h>
> #include <ras/ras_event.h>
> @@ -751,6 +752,7 @@ static void pci_dev_aer_stats_incr(struct pci_dev *pdev,
> break;
> case AER_NONFATAL:
> aer_info->dev_total_nonfatal_errs++;
> + hwerr_log_error_type(HWERR_RECOV_PCI);
> counter = &aer_info->dev_nonfatal_errs[0];
> max = AER_MAX_TYPEOF_UNCOR_ERRS;
> break;
> diff --git a/include/linux/vmcore_info.h b/include/linux/vmcore_info.h
> index 37e003ae52626..538a3635fb1e5 100644
> --- a/include/linux/vmcore_info.h
> +++ b/include/linux/vmcore_info.h
> @@ -77,4 +77,21 @@ extern u32 *vmcoreinfo_note;
> Elf_Word *append_elf_note(Elf_Word *buf, char *name, unsigned int type,
> void *data, size_t data_len);
> void final_note(Elf_Word *buf);
> +
> +enum hwerr_error_type {
> + HWERR_RECOV_MCE,
> + HWERR_RECOV_CPU,
> + HWERR_RECOV_MEMORY,
> + HWERR_RECOV_PCI,
> + HWERR_RECOV_CXL,
> + HWERR_RECOV_OTHERS,
> + HWERR_RECOV_MAX,
> +};
> +
> +#ifdef CONFIG_VMCORE_INFO
> +noinstr void hwerr_log_error_type(enum hwerr_error_type src);
> +#else
> +static inline void hwerr_log_error_type(enum hwerr_error_type src) {};
> +#endif
> +
> #endif /* LINUX_VMCORE_INFO_H */
> diff --git a/kernel/vmcore_info.c b/kernel/vmcore_info.c
> index e066d31d08f89..4b5ab45d468f5 100644
> --- a/kernel/vmcore_info.c
> +++ b/kernel/vmcore_info.c
> @@ -31,6 +31,13 @@ u32 *vmcoreinfo_note;
> /* trusted vmcoreinfo, e.g. we can make a copy in the crash memory */
> static unsigned char *vmcoreinfo_data_safecopy;
>
> +struct hwerr_info {
> + int __data_racy count;
> + time64_t __data_racy timestamp;
> +};
> +
> +static struct hwerr_info hwerr_data[HWERR_RECOV_MAX];
> +
> Elf_Word *append_elf_note(Elf_Word *buf, char *name, unsigned int type,
> void *data, size_t data_len)
> {
> @@ -118,6 +125,17 @@ phys_addr_t __weak paddr_vmcoreinfo_note(void)
> }
> EXPORT_SYMBOL(paddr_vmcoreinfo_note);
>
> +void hwerr_log_error_type(enum hwerr_error_type src)
> +{
> + if (src < 0 || src >= HWERR_RECOV_MAX)
> + return;
> +
> + /* No need to atomics/locks given the precision is not important */
> + hwerr_data[src].count++;
> + hwerr_data[src].timestamp = ktime_get_real_seconds();
> +}
> +EXPORT_SYMBOL_GPL(hwerr_log_error_type);
> +
> static int __init crash_save_vmcoreinfo_init(void)
> {
> vmcoreinfo_data = (unsigned char *)get_zeroed_page(GFP_KERNEL);
Look good for me.
Reviewed-by: Shuai Xue <xueshuai@...ux.alibaba.com>
It would be valuable to get additional review from other RAS experts.
Thanks.
Shuai
Powered by blists - more mailing lists