3 * Purpose: Generic MCA handling layer
5 * Copyright (C) 2004 FUJITSU LIMITED
6 * Copyright (C) Hidetoshi Seto (seto.hidetoshi@jp.fujitsu.com)
7 * Copyright (C) 2005 Silicon Graphics, Inc
8 * Copyright (C) 2005 Keith Owens <kaos@sgi.com>
10 #include <linux/config.h>
11 #include <linux/types.h>
12 #include <linux/init.h>
13 #include <linux/sched.h>
14 #include <linux/interrupt.h>
15 #include <linux/irq.h>
16 #include <linux/kallsyms.h>
17 #include <linux/smp_lock.h>
18 #include <linux/bootmem.h>
19 #include <linux/acpi.h>
20 #include <linux/timer.h>
21 #include <linux/module.h>
22 #include <linux/kernel.h>
23 #include <linux/smp.h>
24 #include <linux/workqueue.h>
27 #include <asm/delay.h>
28 #include <asm/machvec.h>
30 #include <asm/ptrace.h>
31 #include <asm/system.h>
36 #include <asm/hw_irq.h>
40 /* max size of SAL error record (default) */
41 static int sal_rec_max = 10000;
43 /* from mca_drv_asm.S */
44 extern void *mca_handler_bhhook(void);
46 static DEFINE_SPINLOCK(mca_bh_lock);
53 #define MAX_PAGE_ISOLATE 1024
55 static struct page *page_isolate[MAX_PAGE_ISOLATE];
56 static int num_page_isolate = 0;
65 * This pool keeps pointers to the section part of SAL error record
68 slidx_list_t *buffer; /* section pointer list pool */
69 int cur_idx; /* Current index of section pointer list pool */
70 int max_idx; /* Maximum index of section pointer list pool */
74 * mca_page_isolate - isolate a poisoned page in order not to use it later
75 * @paddr: poisoned memory location
78 * one of isolate_status_t, ISOLATE_OK/NG/NONE.
81 static isolate_status_t
82 mca_page_isolate(unsigned long paddr)
87 /* whether physical address is valid or not */
88 if (!ia64_phys_addr_valid(paddr))
91 if (!pfn_valid(paddr >> PAGE_SHIFT))
94 /* convert physical address to physical page number */
95 p = pfn_to_page(paddr>>PAGE_SHIFT);
97 /* check whether a page number have been already registered or not */
98 for (i = 0; i < num_page_isolate; i++)
99 if (page_isolate[i] == p)
100 return ISOLATE_OK; /* already listed */
102 /* limitation check */
103 if (num_page_isolate == MAX_PAGE_ISOLATE)
106 /* kick pages having attribute 'SLAB' or 'Reserved' */
107 if (PageSlab(p) || PageReserved(p))
110 /* add attribute 'Reserved' and register the page */
113 page_isolate[num_page_isolate++] = p;
119 * mca_hanlder_bh - Kill the process which occurred memory read error
120 * @paddr: poisoned address received from MCA Handler
124 mca_handler_bh(unsigned long paddr)
127 "OS_MCA: process [pid: %d](%s) encounters MCA (paddr=%lx)\n",
128 current->pid, current->comm, paddr);
130 spin_lock(&mca_bh_lock);
131 switch (mca_page_isolate(paddr)) {
133 printk(KERN_DEBUG "Page isolation: ( %lx ) success.\n", paddr);
136 printk(KERN_CRIT "Page isolation: ( %lx ) failure.\n", paddr);
141 spin_unlock(&mca_bh_lock);
143 /* This process is about to be killed itself */
148 * mca_make_peidx - Make index of processor error section
149 * @slpi: pointer to record of processor error section
150 * @peidx: pointer to index of processor error section
154 mca_make_peidx(sal_log_processor_info_t *slpi, peidx_table_t *peidx)
157 * calculate the start address of
158 * "struct cpuid_info" and "sal_processor_static_info_t".
160 u64 total_check_num = slpi->valid.num_cache_check
161 + slpi->valid.num_tlb_check
162 + slpi->valid.num_bus_check
163 + slpi->valid.num_reg_file_check
164 + slpi->valid.num_ms_check;
165 u64 head_size = sizeof(sal_log_mod_error_info_t) * total_check_num
166 + sizeof(sal_log_processor_info_t);
167 u64 mid_size = slpi->valid.cpuid_info * sizeof(struct sal_cpuid_info);
169 peidx_head(peidx) = slpi;
170 peidx_mid(peidx) = (struct sal_cpuid_info *)
171 (slpi->valid.cpuid_info ? ((char*)slpi + head_size) : NULL);
172 peidx_bottom(peidx) = (sal_processor_static_info_t *)
173 (slpi->valid.psi_static_struct ?
174 ((char*)slpi + head_size + mid_size) : NULL);
178 * mca_make_slidx - Make index of SAL error record
179 * @buffer: pointer to SAL error record
180 * @slidx: pointer to index of SAL error record
183 * 1 if record has platform error / 0 if not
185 #define LOG_INDEX_ADD_SECT_PTR(sect, ptr) \
186 {slidx_list_t *hl = &slidx_pool.buffer[slidx_pool.cur_idx]; \
188 list_add(&hl->list, &(sect)); \
189 slidx_pool.cur_idx = (slidx_pool.cur_idx + 1)%slidx_pool.max_idx; }
192 mca_make_slidx(void *buffer, slidx_table_t *slidx)
194 int platform_err = 0;
195 int record_len = ((sal_log_record_header_t*)buffer)->len;
198 sal_log_section_hdr_t *sp;
201 * Initialize index referring current record
203 INIT_LIST_HEAD(&(slidx->proc_err));
204 INIT_LIST_HEAD(&(slidx->mem_dev_err));
205 INIT_LIST_HEAD(&(slidx->sel_dev_err));
206 INIT_LIST_HEAD(&(slidx->pci_bus_err));
207 INIT_LIST_HEAD(&(slidx->smbios_dev_err));
208 INIT_LIST_HEAD(&(slidx->pci_comp_err));
209 INIT_LIST_HEAD(&(slidx->plat_specific_err));
210 INIT_LIST_HEAD(&(slidx->host_ctlr_err));
211 INIT_LIST_HEAD(&(slidx->plat_bus_err));
212 INIT_LIST_HEAD(&(slidx->unsupported));
215 * Extract a Record Header
217 slidx->header = buffer;
220 * Extract each section records
221 * (arranged from "int ia64_log_platform_info_print()")
223 for (ercd_pos = sizeof(sal_log_record_header_t), sects = 0;
224 ercd_pos < record_len; ercd_pos += sp->len, sects++) {
225 sp = (sal_log_section_hdr_t *)((char*)buffer + ercd_pos);
226 if (!efi_guidcmp(sp->guid, SAL_PROC_DEV_ERR_SECT_GUID)) {
227 LOG_INDEX_ADD_SECT_PTR(slidx->proc_err, sp);
228 } else if (!efi_guidcmp(sp->guid,
229 SAL_PLAT_MEM_DEV_ERR_SECT_GUID)) {
231 LOG_INDEX_ADD_SECT_PTR(slidx->mem_dev_err, sp);
232 } else if (!efi_guidcmp(sp->guid,
233 SAL_PLAT_SEL_DEV_ERR_SECT_GUID)) {
235 LOG_INDEX_ADD_SECT_PTR(slidx->sel_dev_err, sp);
236 } else if (!efi_guidcmp(sp->guid,
237 SAL_PLAT_PCI_BUS_ERR_SECT_GUID)) {
239 LOG_INDEX_ADD_SECT_PTR(slidx->pci_bus_err, sp);
240 } else if (!efi_guidcmp(sp->guid,
241 SAL_PLAT_SMBIOS_DEV_ERR_SECT_GUID)) {
243 LOG_INDEX_ADD_SECT_PTR(slidx->smbios_dev_err, sp);
244 } else if (!efi_guidcmp(sp->guid,
245 SAL_PLAT_PCI_COMP_ERR_SECT_GUID)) {
247 LOG_INDEX_ADD_SECT_PTR(slidx->pci_comp_err, sp);
248 } else if (!efi_guidcmp(sp->guid,
249 SAL_PLAT_SPECIFIC_ERR_SECT_GUID)) {
251 LOG_INDEX_ADD_SECT_PTR(slidx->plat_specific_err, sp);
252 } else if (!efi_guidcmp(sp->guid,
253 SAL_PLAT_HOST_CTLR_ERR_SECT_GUID)) {
255 LOG_INDEX_ADD_SECT_PTR(slidx->host_ctlr_err, sp);
256 } else if (!efi_guidcmp(sp->guid,
257 SAL_PLAT_BUS_ERR_SECT_GUID)) {
259 LOG_INDEX_ADD_SECT_PTR(slidx->plat_bus_err, sp);
261 LOG_INDEX_ADD_SECT_PTR(slidx->unsupported, sp);
264 slidx->n_sections = sects;
270 * init_record_index_pools - Initialize pool of lists for SAL record index
273 * 0 on Success / -ENOMEM on Failure
276 init_record_index_pools(void)
279 int rec_max_size; /* Maximum size of SAL error records */
280 int sect_min_size; /* Minimum size of SAL error sections */
281 /* minimum size table of each section */
282 static int sal_log_sect_min_sizes[] = {
283 sizeof(sal_log_processor_info_t)
284 + sizeof(sal_processor_static_info_t),
285 sizeof(sal_log_mem_dev_err_info_t),
286 sizeof(sal_log_sel_dev_err_info_t),
287 sizeof(sal_log_pci_bus_err_info_t),
288 sizeof(sal_log_smbios_dev_err_info_t),
289 sizeof(sal_log_pci_comp_err_info_t),
290 sizeof(sal_log_plat_specific_err_info_t),
291 sizeof(sal_log_host_ctlr_err_info_t),
292 sizeof(sal_log_plat_bus_err_info_t),
296 * MCA handler cannot allocate new memory on flight,
297 * so we preallocate enough memory to handle a SAL record.
299 * Initialize a handling set of slidx_pool:
300 * 1. Pick up the max size of SAL error records
301 * 2. Pick up the min size of SAL error sections
302 * 3. Allocate the pool as enough to 2 SAL records
303 * (now we can estimate the maxinum of section in a record.)
307 rec_max_size = sal_rec_max;
310 sect_min_size = sal_log_sect_min_sizes[0];
311 for (i = 1; i < sizeof sal_log_sect_min_sizes/sizeof(size_t); i++)
312 if (sect_min_size > sal_log_sect_min_sizes[i])
313 sect_min_size = sal_log_sect_min_sizes[i];
316 slidx_pool.max_idx = (rec_max_size/sect_min_size) * 2 + 1;
317 slidx_pool.buffer = (slidx_list_t *)
318 kmalloc(slidx_pool.max_idx * sizeof(slidx_list_t), GFP_KERNEL);
320 return slidx_pool.buffer ? 0 : -ENOMEM;
324 /*****************************************************************************
325 * Recovery functions *
326 *****************************************************************************/
329 * is_mca_global - Check whether this MCA is global or not
330 * @peidx: pointer of index of processor error section
331 * @pbci: pointer to pal_bus_check_info_t
332 * @sos: pointer to hand off struct between SAL and OS
335 * MCA_IS_LOCAL / MCA_IS_GLOBAL
339 is_mca_global(peidx_table_t *peidx, pal_bus_check_info_t *pbci,
340 struct ia64_sal_os_state *sos)
342 pal_processor_state_info_t *psp =
343 (pal_processor_state_info_t*)peidx_psp(peidx);
346 * PAL can request a rendezvous, if the MCA has a global scope.
347 * If "rz_always" flag is set, SAL requests MCA rendezvous
348 * in spite of global MCA.
349 * Therefore it is local MCA when rendezvous has not been requested.
350 * Failed to rendezvous, the system must be down.
352 switch (sos->rv_rc) {
353 case -1: /* SAL rendezvous unsuccessful */
354 return MCA_IS_GLOBAL;
355 case 0: /* SAL rendezvous not required */
357 case 1: /* SAL rendezvous successful int */
358 case 2: /* SAL rendezvous successful int with init */
364 * If One or more Cache/TLB/Reg_File/Uarch_Check is here,
365 * it would be a local MCA. (i.e. processor internal error)
367 if (psp->tc || psp->cc || psp->rc || psp->uc)
371 * Bus_Check structure with Bus_Check.ib (internal bus error) flag set
372 * would be a global MCA. (e.g. a system bus address parity error)
374 if (!pbci || pbci->ib)
375 return MCA_IS_GLOBAL;
378 * Bus_Check structure with Bus_Check.eb (external bus error) flag set
379 * could be either a local MCA or a global MCA.
381 * Referring Bus_Check.bsi:
382 * 0: Unknown/unclassified
386 * (FIXME: Are these SGI specific or generic bsi values?)
391 /* e.g. a load from poisoned memory */
396 return MCA_IS_GLOBAL;
399 return MCA_IS_GLOBAL;
403 * recover_from_read_error - Try to recover the errors which type are "read"s.
404 * @slidx: pointer of index of SAL error record
405 * @peidx: pointer of index of processor error section
406 * @pbci: pointer of pal_bus_check_info
407 * @sos: pointer to hand off struct between SAL and OS
410 * 1 on Success / 0 on Failure
414 recover_from_read_error(slidx_table_t *slidx,
415 peidx_table_t *peidx, pal_bus_check_info_t *pbci,
416 struct ia64_sal_os_state *sos)
418 sal_log_mod_error_info_t *smei;
419 pal_min_state_area_t *pmsa;
420 struct ia64_psr *psr1, *psr2;
421 ia64_fptr_t *mca_hdlr_bh = (ia64_fptr_t*)mca_handler_bhhook;
423 /* Is target address valid? */
428 * cpu read or memory-mapped io read
430 * offending process affected process OS MCA do
431 * kernel mode kernel mode down system
432 * kernel mode user mode kill the process
433 * user mode kernel mode down system (*)
434 * user mode user mode kill the process
436 * (*) You could terminate offending user-mode process
437 * if (pbci->pv && pbci->pl != 0) *and* if you sure
438 * the process not have any locks of kernel.
441 /* Is minstate valid? */
442 if (!peidx_bottom(peidx) || !(peidx_bottom(peidx)->valid.minstate))
444 psr1 =(struct ia64_psr *)&(peidx_minstate_area(peidx)->pmsa_ipsr);
447 * Check the privilege level of interrupted context.
448 * If it is user-mode, then terminate affected process.
450 if (psr1->cpl != 0) {
451 smei = peidx_bus_check(peidx, 0);
452 if (smei->valid.target_identifier) {
454 * setup for resume to bottom half of MCA,
455 * "mca_handler_bhhook"
457 pmsa = sos->pal_min_state;
458 /* pass to bhhook as 1st argument (gr8) */
459 pmsa->pmsa_gr[8-1] = smei->target_identifier;
460 /* set interrupted return address (but no use) */
461 pmsa->pmsa_br0 = pmsa->pmsa_iip;
462 /* change resume address to bottom half */
463 pmsa->pmsa_iip = mca_hdlr_bh->fp;
464 pmsa->pmsa_gr[1-1] = mca_hdlr_bh->gp;
465 /* set cpl with kernel mode */
466 psr2 = (struct ia64_psr *)&pmsa->pmsa_ipsr;
480 * recover_from_platform_error - Recover from platform error.
481 * @slidx: pointer of index of SAL error record
482 * @peidx: pointer of index of processor error section
483 * @pbci: pointer of pal_bus_check_info
484 * @sos: pointer to hand off struct between SAL and OS
487 * 1 on Success / 0 on Failure
491 recover_from_platform_error(slidx_table_t *slidx, peidx_table_t *peidx,
492 pal_bus_check_info_t *pbci,
493 struct ia64_sal_os_state *sos)
496 pal_processor_state_info_t *psp =
497 (pal_processor_state_info_t*)peidx_psp(peidx);
499 if (psp->bc && pbci->eb && pbci->bsi == 0) {
501 case 1: /* partial read */
502 case 3: /* full line(cpu) read */
503 case 9: /* I/O space read */
504 status = recover_from_read_error(slidx, peidx, pbci,
507 case 0: /* unknown */
508 case 2: /* partial write */
509 case 4: /* full line write */
510 case 5: /* implicit or explicit write-back operation */
511 case 6: /* snoop probe */
512 case 7: /* incoming or outgoing ptc.g */
513 case 8: /* write coalescing transactions */
514 case 10: /* I/O space write */
515 case 11: /* inter-processor interrupt message(IPI) */
516 case 12: /* interrupt acknowledge or
517 external task priority cycle */
527 * recover_from_processor_error
528 * @platform: whether there are some platform error section or not
529 * @slidx: pointer of index of SAL error record
530 * @peidx: pointer of index of processor error section
531 * @pbci: pointer of pal_bus_check_info
532 * @sos: pointer to hand off struct between SAL and OS
535 * 1 on Success / 0 on Failure
538 * Later we try to recover when below all conditions are satisfied.
539 * 1. Only one processor error section is exist.
540 * 2. BUS_CHECK is exist and the others are not exist.(Except TLB_CHECK)
541 * 3. The entry of BUS_CHECK_INFO is 1.
542 * 4. "External bus error" flag is set and the others are not set.
546 recover_from_processor_error(int platform, slidx_table_t *slidx,
547 peidx_table_t *peidx, pal_bus_check_info_t *pbci,
548 struct ia64_sal_os_state *sos)
550 pal_processor_state_info_t *psp =
551 (pal_processor_state_info_t*)peidx_psp(peidx);
554 * Processor recovery status must key off of the PAL recovery
555 * status in the Processor State Parameter.
559 * The machine check is corrected.
565 * The error was not contained. Software must be reset.
567 if (psp->us || psp->ci == 0)
571 * The cache check and bus check bits have four possible states
573 * 0 0 Weird record, not recovered
574 * 1 0 Cache error, not recovered
575 * 0 1 I/O error, attempt recovery
576 * 1 1 Memory error, attempt recovery
578 if (psp->bc == 0 || pbci == NULL)
582 * Sorry, we cannot handle so many.
584 if (peidx_bus_check_num(peidx) > 1)
587 * Well, here is only one bus error.
589 if (pbci->ib || pbci->cc)
591 if (pbci->eb && pbci->bsi > 0)
595 * This is a local MCA and estimated as recoverble external bus error.
596 * (e.g. a load from poisoned memory)
597 * This means "there are some platform errors".
600 return recover_from_platform_error(slidx, peidx, pbci, sos);
602 * On account of strange SAL error record, we cannot recover.
608 * mca_try_to_recover - Try to recover from MCA
609 * @rec: pointer to a SAL error record
610 * @sos: pointer to hand off struct between SAL and OS
613 * 1 on Success / 0 on Failure
617 mca_try_to_recover(void *rec, struct ia64_sal_os_state *sos)
623 pal_bus_check_info_t pbci;
625 /* Make index of SAL error record */
626 platform_err = mca_make_slidx(rec, &slidx);
628 /* Count processor error sections */
629 n_proc_err = slidx_count(&slidx, proc_err);
631 /* Now, OS can recover when there is one processor error section */
634 else if (n_proc_err == 0) {
635 /* Weird SAL record ... We need not to recover */
640 /* Make index of processor error section */
641 mca_make_peidx((sal_log_processor_info_t*)
642 slidx_first_entry(&slidx.proc_err)->hdr, &peidx);
644 /* Extract Processor BUS_CHECK[0] */
645 *((u64*)&pbci) = peidx_check_info(&peidx, bus_check, 0);
647 /* Check whether MCA is global or not */
648 if (is_mca_global(&peidx, &pbci, sos))
651 /* Try to recover a processor error */
652 return recover_from_processor_error(platform_err, &slidx, &peidx,
657 * =============================================================================
660 int __init mca_external_handler_init(void)
662 if (init_record_index_pools())
665 /* register external mca handlers */
666 if (ia64_reg_MCA_extension(mca_try_to_recover)) {
667 printk(KERN_ERR "ia64_reg_MCA_extension failed.\n");
668 kfree(slidx_pool.buffer);
674 void __exit mca_external_handler_exit(void)
676 /* unregister external mca handlers */
677 ia64_unreg_MCA_extension();
678 kfree(slidx_pool.buffer);
681 module_init(mca_external_handler_init);
682 module_exit(mca_external_handler_exit);
684 module_param(sal_rec_max, int, 0644);
685 MODULE_PARM_DESC(sal_rec_max, "Max size of SAL error record");
687 MODULE_DESCRIPTION("ia64 platform dependent mca handler driver");
688 MODULE_LICENSE("GPL");