Shiyang Ruan wrote: > Currently driver only traces cxl events, poison creation (for both vmem > and pmem type) on cxl memdev is silent.
As it should be. > OS needs to be notified then it could handle poison pages in time. No, it was always the case that latent poison is an "action optional" event. I am not understanding the justification for this approach. What breaks if the kernel does not forward events to memory_failure_queue()? Consider that in the CPU consumption case that the firmware first path will do its own memory_failure_queue() and in the native case the MCE handler will take care of this. So that leaves pages that are accessed by DMA or background operation that encounter poison. Those are "action optional" scenarios and it is not clear to me how the driver tells the difference. This needs more precision on which agent is repsonsible for what level of reporting. The distribution of responsibility between ACPI GHES, EDAC, and the CXL driver is messy and I expect this changelog to demonstrate it understands all those considerations. > Per CXL spec, the device error event could be signaled through > FW-First and OS-First methods. > > So, add poison creation event handler in OS-First method: > - Qemu: Why is QEMU relevant for this patch? QEMU is only a development vehicle the upstream enabling should be reference shipping or expected to be shipping hardware implementations. > - CXL device reports POISON creation event to OS by MSI by sending > GMER/DER after injecting a poison record; When you say "inject" here do you mean "add to the poison list if present". Because "inject" to me means the "Inject Poison" Memory Device Command. > - CXL driver: > a. parse the POISON event from GMER/DER; > b. translate poisoned DPA to HPA (PFN); > c. enqueue poisoned PFN to memory_failure's work queue; > > Signed-off-by: Shiyang Ruan <ruansy.f...@fujitsu.com> > --- > drivers/cxl/core/mbox.c | 119 +++++++++++++++++++++++++++++++++----- > drivers/cxl/cxlmem.h | 8 +-- > include/linux/cxl-event.h | 18 +++++- > 3 files changed, 125 insertions(+), 20 deletions(-) > > diff --git a/drivers/cxl/core/mbox.c b/drivers/cxl/core/mbox.c > index f0f54aeccc87..76af0d73859d 100644 > --- a/drivers/cxl/core/mbox.c > +++ b/drivers/cxl/core/mbox.c > @@ -837,25 +837,116 @@ int cxl_enumerate_cmds(struct cxl_memdev_state *mds) > } > EXPORT_SYMBOL_NS_GPL(cxl_enumerate_cmds, CXL); > > -void cxl_event_trace_record(const struct cxl_memdev *cxlmd, > - enum cxl_event_log_type type, > - enum cxl_event_type event_type, > - const uuid_t *uuid, union cxl_event *evt) > +static void cxl_report_poison(struct cxl_memdev *cxlmd, struct cxl_region > *cxlr, > + u64 dpa) > { > - if (event_type == CXL_CPER_EVENT_GEN_MEDIA) > + u64 hpa = cxl_trace_hpa(cxlr, cxlmd, dpa); > + unsigned long pfn = PHYS_PFN(hpa); > + > + if (!IS_ENABLED(CONFIG_MEMORY_FAILURE)) > + return; No need for this check, memory_failure_queue() is already stubbed out in the CONFIG_MEMORY_FAILURE=n case. > + memory_failure_queue(pfn, MF_ACTION_REQUIRED); My expectation is MF_ACTION_REQUIRED is not appropriate for CXL event reported errors since action is only required for direct consumption events and those need not be reported through the device event queue. It would be useful to collaborate with a BIOS firmware engineer so that the kernel ends up with similar logic as is used to set CPER record severity, or at least understands why it would want to be different. See how ghes_handle_memory_failure() determines the memory_failure_queue() flags.