2019-06-01 10:08:55 +02:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2009-05-27 21:56:54 +02:00
|
|
|
/*
|
|
|
|
|
* MCE grading rules.
|
|
|
|
|
* Copyright 2008, 2009 Intel Corporation.
|
|
|
|
|
*
|
|
|
|
|
* Author: Andi Kleen
|
|
|
|
|
*/
|
|
|
|
|
#include <linux/kernel.h>
|
2009-05-27 21:56:57 +02:00
|
|
|
#include <linux/seq_file.h>
|
|
|
|
|
#include <linux/init.h>
|
|
|
|
|
#include <linux/debugfs.h>
|
2016-12-24 11:46:01 -08:00
|
|
|
#include <linux/uaccess.h>
|
2009-05-27 21:56:54 +02:00
|
|
|
|
2020-09-29 19:13:12 -07:00
|
|
|
#include <asm/mce.h>
|
|
|
|
|
#include <asm/intel-family.h>
|
2020-10-06 14:09:10 -07:00
|
|
|
#include <asm/traps.h>
|
|
|
|
|
#include <asm/insn.h>
|
|
|
|
|
#include <asm/insn-eval.h>
|
2020-09-29 19:13:12 -07:00
|
|
|
|
2018-11-18 15:15:05 +01:00
|
|
|
#include "internal.h"
|
2009-05-27 21:56:54 +02:00
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Grade an mce by severity. In general the most severe ones are processed
|
|
|
|
|
* first. Since there are quite a lot of combinations test the bits in a
|
|
|
|
|
* table-driven way. The rules are simply processed in order, first
|
|
|
|
|
* match wins.
|
2009-05-27 21:56:57 +02:00
|
|
|
*
|
|
|
|
|
* Note this is only used for machine check exceptions, the corrected
|
|
|
|
|
* errors use much simpler rules. The exceptions still check for the corrected
|
|
|
|
|
* errors, but only to leave them alone for the CMCI handler (except for
|
|
|
|
|
* panic situations)
|
2009-05-27 21:56:54 +02:00
|
|
|
*/
|
|
|
|
|
|
2016-02-17 10:20:13 -08:00
|
|
|
enum context { IN_KERNEL = 1, IN_USER = 2, IN_KERNEL_RECOV = 3 };
|
2009-05-27 21:56:57 +02:00
|
|
|
enum ser { SER_REQUIRED = 1, NO_SER = 2 };
|
2014-11-18 10:09:19 +08:00
|
|
|
enum exception { EXCP_CONTEXT = 1, NO_EXCP = 2 };
|
2009-05-27 21:56:57 +02:00
|
|
|
|
2009-05-27 21:56:54 +02:00
|
|
|
static struct severity {
|
|
|
|
|
u64 mask;
|
|
|
|
|
u64 result;
|
|
|
|
|
unsigned char sev;
|
|
|
|
|
unsigned char mcgmask;
|
|
|
|
|
unsigned char mcgres;
|
2009-05-27 21:56:57 +02:00
|
|
|
unsigned char ser;
|
|
|
|
|
unsigned char context;
|
2014-11-18 10:09:19 +08:00
|
|
|
unsigned char excp;
|
2009-05-27 21:56:57 +02:00
|
|
|
unsigned char covered;
|
2020-09-29 19:13:12 -07:00
|
|
|
unsigned char cpu_model;
|
|
|
|
|
unsigned char cpu_minstepping;
|
|
|
|
|
unsigned char bank_lo, bank_hi;
|
2009-05-27 21:56:54 +02:00
|
|
|
char *msg;
|
|
|
|
|
} severities[] = {
|
2011-06-08 10:53:35 +09:00
|
|
|
#define MCESEV(s, m, c...) { .sev = MCE_ ## s ## _SEVERITY, .msg = m, ## c }
|
2020-09-29 19:13:12 -07:00
|
|
|
#define BANK_RANGE(l, h) .bank_lo = l, .bank_hi = h
|
|
|
|
|
#define MODEL_STEPPING(m, s) .cpu_model = m, .cpu_minstepping = s
|
2011-06-08 10:53:35 +09:00
|
|
|
#define KERNEL .context = IN_KERNEL
|
|
|
|
|
#define USER .context = IN_USER
|
2016-02-17 10:20:13 -08:00
|
|
|
#define KERNEL_RECOV .context = IN_KERNEL_RECOV
|
2011-06-08 10:53:35 +09:00
|
|
|
#define SER .ser = SER_REQUIRED
|
|
|
|
|
#define NOSER .ser = NO_SER
|
2014-11-18 10:09:19 +08:00
|
|
|
#define EXCP .excp = EXCP_CONTEXT
|
|
|
|
|
#define NOEXCP .excp = NO_EXCP
|
2011-06-08 10:53:35 +09:00
|
|
|
#define BITCLR(x) .mask = x, .result = 0
|
|
|
|
|
#define BITSET(x) .mask = x, .result = x
|
|
|
|
|
#define MCGMASK(x, y) .mcgmask = x, .mcgres = y
|
|
|
|
|
#define MASK(x, y) .mask = x, .result = y
|
2009-05-27 21:56:57 +02:00
|
|
|
#define MCI_UC_S (MCI_STATUS_UC|MCI_STATUS_S)
|
x86/MCE: Extend table to report action optional errors through CMCI too
According to the Intel SDM Volume 3B (253669-063US, July 2017), action
optional (SRAO) errors can be reported either via MCE or CMC:
In cases when SRAO is signaled via CMCI the error signature is
indicated via UC=1, PCC=0, S=0.
Type(*1) UC EN PCC S AR Signaling
---------------------------------------------------------------
UC 1 1 1 x x MCE
SRAR 1 1 0 1 1 MCE
SRAO 1 x(*2) 0 x(*2) 0 MCE/CMC
UCNA 1 x 0 0 0 CMC
CE 0 x x x x CMC
NOTES:
1. SRAR, SRAO and UCNA errors are supported by the processor only
when IA32_MCG_CAP[24] (MCG_SER_P) is set.
2. EN=1, S=1 when signaled via MCE. EN=x, S=0 when signaled via CMC.
And there is a description in 15.6.2 UCR Error Reporting and Logging, for
bit S:
S (Signaling) flag, bit 56 - Indicates (when set) that a machine check
exception was generated for the UCR error reported in this MC bank...
When the S flag in the IA32_MCi_STATUS register is clear, this UCR error
was not signaled via a machine check exception and instead was reported
as a corrected machine check (CMC).
So merge the two cases and just remove the S=0 check for SRAO in
mce_severity().
[ Borislav: Massage commit message.]
Signed-off-by: Xie XiuQi <xiexiuqi@huawei.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Tony Luck <tony.luck@intel.com>
Tested-by: Chen Wei <chenwei68@huawei.com>
Cc: linux-edac <linux-edac@vger.kernel.org>
Link: http://lkml.kernel.org/r/1511575548-41992-1-git-send-email-xiexiuqi@huawei.com
2017-12-04 17:54:37 +01:00
|
|
|
#define MCI_UC_AR (MCI_STATUS_UC|MCI_STATUS_AR)
|
2009-05-27 21:56:57 +02:00
|
|
|
#define MCI_UC_SAR (MCI_STATUS_UC|MCI_STATUS_S|MCI_STATUS_AR)
|
2012-01-03 11:48:04 -08:00
|
|
|
#define MCI_ADDR (MCI_STATUS_ADDRV|MCI_STATUS_MISCV)
|
2009-05-27 21:56:57 +02:00
|
|
|
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
|
|
|
|
NO, "Invalid",
|
|
|
|
|
BITCLR(MCI_STATUS_VAL)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
|
|
|
|
NO, "Not enabled",
|
2014-11-18 10:09:19 +08:00
|
|
|
EXCP, BITCLR(MCI_STATUS_EN)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
|
|
|
|
PANIC, "Processor context corrupt",
|
|
|
|
|
BITSET(MCI_STATUS_PCC)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2009-05-27 21:56:57 +02:00
|
|
|
/* When MCIP is not set something is very confused */
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
|
|
|
|
PANIC, "MCIP not set in MCA handler",
|
2014-11-18 10:09:19 +08:00
|
|
|
EXCP, MCGMASK(MCG_STATUS_MCIP, 0)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2009-05-27 21:56:57 +02:00
|
|
|
/* Neither return not error IP -- no chance to recover -> PANIC */
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
|
|
|
|
PANIC, "Neither restart nor error IP",
|
2014-11-18 10:09:19 +08:00
|
|
|
EXCP, MCGMASK(MCG_STATUS_RIPV|MCG_STATUS_EIPV, 0)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
2011-06-08 10:52:43 +09:00
|
|
|
PANIC, "In kernel and no restart IP",
|
2014-11-18 10:09:19 +08:00
|
|
|
EXCP, KERNEL, MCGMASK(MCG_STATUS_RIPV, 0)
|
|
|
|
|
),
|
2016-02-17 10:20:13 -08:00
|
|
|
MCESEV(
|
|
|
|
|
PANIC, "In kernel and no restart IP",
|
|
|
|
|
EXCP, KERNEL_RECOV, MCGMASK(MCG_STATUS_RIPV, 0)
|
|
|
|
|
),
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
2011-06-08 10:52:43 +09:00
|
|
|
KEEP, "Corrected error",
|
2011-06-08 10:53:35 +09:00
|
|
|
NOSER, BITCLR(MCI_STATUS_UC)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
x86/MCE: Extend table to report action optional errors through CMCI too
According to the Intel SDM Volume 3B (253669-063US, July 2017), action
optional (SRAO) errors can be reported either via MCE or CMC:
In cases when SRAO is signaled via CMCI the error signature is
indicated via UC=1, PCC=0, S=0.
Type(*1) UC EN PCC S AR Signaling
---------------------------------------------------------------
UC 1 1 1 x x MCE
SRAR 1 1 0 1 1 MCE
SRAO 1 x(*2) 0 x(*2) 0 MCE/CMC
UCNA 1 x 0 0 0 CMC
CE 0 x x x x CMC
NOTES:
1. SRAR, SRAO and UCNA errors are supported by the processor only
when IA32_MCG_CAP[24] (MCG_SER_P) is set.
2. EN=1, S=1 when signaled via MCE. EN=x, S=0 when signaled via CMC.
And there is a description in 15.6.2 UCR Error Reporting and Logging, for
bit S:
S (Signaling) flag, bit 56 - Indicates (when set) that a machine check
exception was generated for the UCR error reported in this MC bank...
When the S flag in the IA32_MCi_STATUS register is clear, this UCR error
was not signaled via a machine check exception and instead was reported
as a corrected machine check (CMC).
So merge the two cases and just remove the S=0 check for SRAO in
mce_severity().
[ Borislav: Massage commit message.]
Signed-off-by: Xie XiuQi <xiexiuqi@huawei.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Tony Luck <tony.luck@intel.com>
Tested-by: Chen Wei <chenwei68@huawei.com>
Cc: linux-edac <linux-edac@vger.kernel.org>
Link: http://lkml.kernel.org/r/1511575548-41992-1-git-send-email-xiexiuqi@huawei.com
2017-12-04 17:54:37 +01:00
|
|
|
/*
|
|
|
|
|
* known AO MCACODs reported via MCE or CMC:
|
|
|
|
|
*
|
|
|
|
|
* SRAO could be signaled either via a machine check exception or
|
|
|
|
|
* CMCI with the corresponding bit S 1 or 0. So we don't need to
|
|
|
|
|
* check bit S for SRAO.
|
|
|
|
|
*/
|
|
|
|
|
MCESEV(
|
|
|
|
|
AO, "Action optional: memory scrubbing error",
|
2019-07-18 11:29:20 -07:00
|
|
|
SER, MASK(MCI_UC_AR|MCACOD_SCRUBMSK, MCI_STATUS_UC|MCACOD_SCRUB)
|
x86/MCE: Extend table to report action optional errors through CMCI too
According to the Intel SDM Volume 3B (253669-063US, July 2017), action
optional (SRAO) errors can be reported either via MCE or CMC:
In cases when SRAO is signaled via CMCI the error signature is
indicated via UC=1, PCC=0, S=0.
Type(*1) UC EN PCC S AR Signaling
---------------------------------------------------------------
UC 1 1 1 x x MCE
SRAR 1 1 0 1 1 MCE
SRAO 1 x(*2) 0 x(*2) 0 MCE/CMC
UCNA 1 x 0 0 0 CMC
CE 0 x x x x CMC
NOTES:
1. SRAR, SRAO and UCNA errors are supported by the processor only
when IA32_MCG_CAP[24] (MCG_SER_P) is set.
2. EN=1, S=1 when signaled via MCE. EN=x, S=0 when signaled via CMC.
And there is a description in 15.6.2 UCR Error Reporting and Logging, for
bit S:
S (Signaling) flag, bit 56 - Indicates (when set) that a machine check
exception was generated for the UCR error reported in this MC bank...
When the S flag in the IA32_MCi_STATUS register is clear, this UCR error
was not signaled via a machine check exception and instead was reported
as a corrected machine check (CMC).
So merge the two cases and just remove the S=0 check for SRAO in
mce_severity().
[ Borislav: Massage commit message.]
Signed-off-by: Xie XiuQi <xiexiuqi@huawei.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Tony Luck <tony.luck@intel.com>
Tested-by: Chen Wei <chenwei68@huawei.com>
Cc: linux-edac <linux-edac@vger.kernel.org>
Link: http://lkml.kernel.org/r/1511575548-41992-1-git-send-email-xiexiuqi@huawei.com
2017-12-04 17:54:37 +01:00
|
|
|
),
|
|
|
|
|
MCESEV(
|
|
|
|
|
AO, "Action optional: last level cache writeback error",
|
2019-07-18 11:29:20 -07:00
|
|
|
SER, MASK(MCI_UC_AR|MCACOD, MCI_STATUS_UC|MCACOD_L3WB)
|
x86/MCE: Extend table to report action optional errors through CMCI too
According to the Intel SDM Volume 3B (253669-063US, July 2017), action
optional (SRAO) errors can be reported either via MCE or CMC:
In cases when SRAO is signaled via CMCI the error signature is
indicated via UC=1, PCC=0, S=0.
Type(*1) UC EN PCC S AR Signaling
---------------------------------------------------------------
UC 1 1 1 x x MCE
SRAR 1 1 0 1 1 MCE
SRAO 1 x(*2) 0 x(*2) 0 MCE/CMC
UCNA 1 x 0 0 0 CMC
CE 0 x x x x CMC
NOTES:
1. SRAR, SRAO and UCNA errors are supported by the processor only
when IA32_MCG_CAP[24] (MCG_SER_P) is set.
2. EN=1, S=1 when signaled via MCE. EN=x, S=0 when signaled via CMC.
And there is a description in 15.6.2 UCR Error Reporting and Logging, for
bit S:
S (Signaling) flag, bit 56 - Indicates (when set) that a machine check
exception was generated for the UCR error reported in this MC bank...
When the S flag in the IA32_MCi_STATUS register is clear, this UCR error
was not signaled via a machine check exception and instead was reported
as a corrected machine check (CMC).
So merge the two cases and just remove the S=0 check for SRAO in
mce_severity().
[ Borislav: Massage commit message.]
Signed-off-by: Xie XiuQi <xiexiuqi@huawei.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Tony Luck <tony.luck@intel.com>
Tested-by: Chen Wei <chenwei68@huawei.com>
Cc: linux-edac <linux-edac@vger.kernel.org>
Link: http://lkml.kernel.org/r/1511575548-41992-1-git-send-email-xiexiuqi@huawei.com
2017-12-04 17:54:37 +01:00
|
|
|
),
|
2020-09-29 19:13:12 -07:00
|
|
|
/*
|
|
|
|
|
* Quirk for Skylake/Cascade Lake. Patrol scrubber may be configured
|
|
|
|
|
* to report uncorrected errors using CMCI with a special signature.
|
|
|
|
|
* UC=0, MSCOD=0x0010, MCACOD=binary(000X 0000 1100 XXXX) reported
|
|
|
|
|
* in one of the memory controller banks.
|
|
|
|
|
* Set severity to "AO" for same action as normal patrol scrub error.
|
|
|
|
|
*/
|
|
|
|
|
MCESEV(
|
|
|
|
|
AO, "Uncorrected Patrol Scrub Error",
|
|
|
|
|
SER, MASK(MCI_STATUS_UC|MCI_ADDR|0xffffeff0, MCI_ADDR|0x001000c0),
|
|
|
|
|
MODEL_STEPPING(INTEL_FAM6_SKYLAKE_X, 4), BANK_RANGE(13, 18)
|
|
|
|
|
),
|
x86/MCE: Extend table to report action optional errors through CMCI too
According to the Intel SDM Volume 3B (253669-063US, July 2017), action
optional (SRAO) errors can be reported either via MCE or CMC:
In cases when SRAO is signaled via CMCI the error signature is
indicated via UC=1, PCC=0, S=0.
Type(*1) UC EN PCC S AR Signaling
---------------------------------------------------------------
UC 1 1 1 x x MCE
SRAR 1 1 0 1 1 MCE
SRAO 1 x(*2) 0 x(*2) 0 MCE/CMC
UCNA 1 x 0 0 0 CMC
CE 0 x x x x CMC
NOTES:
1. SRAR, SRAO and UCNA errors are supported by the processor only
when IA32_MCG_CAP[24] (MCG_SER_P) is set.
2. EN=1, S=1 when signaled via MCE. EN=x, S=0 when signaled via CMC.
And there is a description in 15.6.2 UCR Error Reporting and Logging, for
bit S:
S (Signaling) flag, bit 56 - Indicates (when set) that a machine check
exception was generated for the UCR error reported in this MC bank...
When the S flag in the IA32_MCi_STATUS register is clear, this UCR error
was not signaled via a machine check exception and instead was reported
as a corrected machine check (CMC).
So merge the two cases and just remove the S=0 check for SRAO in
mce_severity().
[ Borislav: Massage commit message.]
Signed-off-by: Xie XiuQi <xiexiuqi@huawei.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Tony Luck <tony.luck@intel.com>
Tested-by: Chen Wei <chenwei68@huawei.com>
Cc: linux-edac <linux-edac@vger.kernel.org>
Link: http://lkml.kernel.org/r/1511575548-41992-1-git-send-email-xiexiuqi@huawei.com
2017-12-04 17:54:37 +01:00
|
|
|
|
2009-05-27 21:56:57 +02:00
|
|
|
/* ignore OVER for UCNA */
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
2014-11-18 10:09:19 +08:00
|
|
|
UCNA, "Uncorrected no action required",
|
2011-06-08 10:53:35 +09:00
|
|
|
SER, MASK(MCI_UC_SAR, MCI_STATUS_UC)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
2011-06-08 10:52:43 +09:00
|
|
|
PANIC, "Illegal combination (UCNA with AR=1)",
|
2011-06-08 10:53:35 +09:00
|
|
|
SER,
|
|
|
|
|
MASK(MCI_STATUS_OVER|MCI_UC_SAR, MCI_STATUS_UC|MCI_STATUS_AR)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
2021-03-21 22:28:53 +01:00
|
|
|
KEEP, "Non signaled machine check",
|
2011-06-08 10:55:05 +09:00
|
|
|
SER, BITCLR(MCI_STATUS_S)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2009-05-27 21:56:57 +02:00
|
|
|
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
2011-06-08 10:52:43 +09:00
|
|
|
PANIC, "Action required with lost events",
|
2011-06-08 10:55:05 +09:00
|
|
|
SER, BITSET(MCI_STATUS_OVER|MCI_UC_SAR)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2012-01-03 11:48:04 -08:00
|
|
|
|
|
|
|
|
/* known AR MCACODs: */
|
|
|
|
|
#ifdef CONFIG_MEMORY_FAILURE
|
|
|
|
|
MCESEV(
|
2013-06-20 05:16:12 -04:00
|
|
|
KEEP, "Action required but unaffected thread is continuable",
|
2013-07-24 10:09:43 -07:00
|
|
|
SER, MASK(MCI_STATUS_OVER|MCI_UC_SAR|MCI_ADDR, MCI_UC_SAR|MCI_ADDR),
|
|
|
|
|
MCGMASK(MCG_STATUS_RIPV|MCG_STATUS_EIPV, MCG_STATUS_RIPV)
|
2012-01-03 11:48:04 -08:00
|
|
|
),
|
2016-02-17 10:20:13 -08:00
|
|
|
MCESEV(
|
|
|
|
|
AR, "Action required: data load in error recoverable area of kernel",
|
|
|
|
|
SER, MASK(MCI_STATUS_OVER|MCI_UC_SAR|MCI_ADDR|MCACOD, MCI_UC_SAR|MCI_ADDR|MCACOD_DATA),
|
|
|
|
|
KERNEL_RECOV
|
|
|
|
|
),
|
2012-01-03 11:48:04 -08:00
|
|
|
MCESEV(
|
2013-06-20 05:16:12 -04:00
|
|
|
AR, "Action required: data load error in a user process",
|
2012-01-26 16:02:22 -08:00
|
|
|
SER, MASK(MCI_STATUS_OVER|MCI_UC_SAR|MCI_ADDR|MCACOD, MCI_UC_SAR|MCI_ADDR|MCACOD_DATA),
|
2012-01-03 11:48:04 -08:00
|
|
|
USER
|
|
|
|
|
),
|
2012-05-10 11:12:14 -07:00
|
|
|
MCESEV(
|
2013-06-20 05:16:12 -04:00
|
|
|
AR, "Action required: instruction fetch error in a user process",
|
2012-05-10 11:12:14 -07:00
|
|
|
SER, MASK(MCI_STATUS_OVER|MCI_UC_SAR|MCI_ADDR|MCACOD, MCI_UC_SAR|MCI_ADDR|MCACOD_INSTR),
|
|
|
|
|
USER
|
|
|
|
|
),
|
2018-05-25 14:41:39 -07:00
|
|
|
MCESEV(
|
|
|
|
|
PANIC, "Data load in unrecoverable area of kernel",
|
|
|
|
|
SER, MASK(MCI_STATUS_OVER|MCI_UC_SAR|MCI_ADDR|MCACOD, MCI_UC_SAR|MCI_ADDR|MCACOD_DATA),
|
|
|
|
|
KERNEL
|
|
|
|
|
),
|
2019-02-25 12:59:40 -08:00
|
|
|
MCESEV(
|
|
|
|
|
PANIC, "Instruction fetch error in kernel",
|
|
|
|
|
SER, MASK(MCI_STATUS_OVER|MCI_UC_SAR|MCI_ADDR|MCACOD, MCI_UC_SAR|MCI_ADDR|MCACOD_INSTR),
|
|
|
|
|
KERNEL
|
|
|
|
|
),
|
2012-01-03 11:48:04 -08:00
|
|
|
#endif
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
2011-06-08 10:55:05 +09:00
|
|
|
PANIC, "Action required: unknown MCACOD",
|
2011-06-08 10:53:35 +09:00
|
|
|
SER, MASK(MCI_STATUS_OVER|MCI_UC_SAR, MCI_UC_SAR)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2009-05-27 21:56:57 +02:00
|
|
|
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
2011-06-08 10:55:05 +09:00
|
|
|
SOME, "Action optional: unknown MCACOD",
|
2011-06-08 10:53:35 +09:00
|
|
|
SER, MASK(MCI_STATUS_OVER|MCI_UC_SAR, MCI_UC_S)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
2011-06-08 10:52:43 +09:00
|
|
|
SOME, "Action optional with lost events",
|
2011-06-08 10:55:05 +09:00
|
|
|
SER, MASK(MCI_STATUS_OVER|MCI_UC_SAR, MCI_STATUS_OVER|MCI_UC_S)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2011-06-08 10:53:35 +09:00
|
|
|
|
|
|
|
|
MCESEV(
|
|
|
|
|
PANIC, "Overflowed uncorrected",
|
2011-06-08 10:55:05 +09:00
|
|
|
BITSET(MCI_STATUS_OVER|MCI_STATUS_UC)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
|
|
|
|
UC, "Uncorrected",
|
|
|
|
|
BITSET(MCI_STATUS_UC)
|
2011-06-08 10:52:43 +09:00
|
|
|
),
|
2011-06-08 10:53:35 +09:00
|
|
|
MCESEV(
|
|
|
|
|
SOME, "No match",
|
|
|
|
|
BITSET(0)
|
2011-06-08 10:52:43 +09:00
|
|
|
) /* always matches. keep at end */
|
2009-05-27 21:56:54 +02:00
|
|
|
};
|
|
|
|
|
|
2016-02-17 10:20:13 -08:00
|
|
|
#define mc_recoverable(mcg) (((mcg) & (MCG_STATUS_RIPV|MCG_STATUS_EIPV)) == \
|
|
|
|
|
(MCG_STATUS_RIPV|MCG_STATUS_EIPV))
|
|
|
|
|
|
2020-10-06 14:09:10 -07:00
|
|
|
static bool is_copy_from_user(struct pt_regs *regs)
|
|
|
|
|
{
|
|
|
|
|
u8 insn_buf[MAX_INSN_SIZE];
|
|
|
|
|
unsigned long addr;
|
2020-11-06 19:39:08 +01:00
|
|
|
struct insn insn;
|
|
|
|
|
int ret;
|
2020-10-06 14:09:10 -07:00
|
|
|
|
2021-12-17 16:49:25 +01:00
|
|
|
if (!regs)
|
|
|
|
|
return false;
|
|
|
|
|
|
2020-10-06 14:09:10 -07:00
|
|
|
if (copy_from_kernel_nofault(insn_buf, (void *)regs->ip, MAX_INSN_SIZE))
|
|
|
|
|
return false;
|
|
|
|
|
|
2021-03-26 16:12:00 +01:00
|
|
|
ret = insn_decode_kernel(&insn, insn_buf);
|
2020-11-06 19:39:08 +01:00
|
|
|
if (ret < 0)
|
2020-10-06 14:09:10 -07:00
|
|
|
return false;
|
|
|
|
|
|
|
|
|
|
switch (insn.opcode.value) {
|
|
|
|
|
/* MOV mem,reg */
|
|
|
|
|
case 0x8A: case 0x8B:
|
|
|
|
|
/* MOVZ mem,reg */
|
|
|
|
|
case 0xB60F: case 0xB70F:
|
|
|
|
|
addr = (unsigned long)insn_get_addr_ref(&insn, regs);
|
|
|
|
|
break;
|
|
|
|
|
/* REP MOVS */
|
|
|
|
|
case 0xA4: case 0xA5:
|
|
|
|
|
addr = regs->si;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (fault_in_kernel_space(addr))
|
|
|
|
|
return false;
|
|
|
|
|
|
|
|
|
|
current->mce_vaddr = (void __user *)addr;
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2009-05-27 21:56:57 +02:00
|
|
|
/*
|
2012-05-23 14:14:22 -07:00
|
|
|
* If mcgstatus indicated that ip/cs on the stack were
|
|
|
|
|
* no good, then "m->cs" will be zero and we will have
|
|
|
|
|
* to assume the worst case (IN_KERNEL) as we actually
|
|
|
|
|
* have no idea what we were executing when the machine
|
|
|
|
|
* check hit.
|
|
|
|
|
* If we do have a good "m->cs" (or a faked one in the
|
|
|
|
|
* case we were executing in VM86 mode) we can use it to
|
|
|
|
|
* distinguish an exception taken in user from from one
|
|
|
|
|
* taken in the kernel.
|
2009-05-27 21:56:57 +02:00
|
|
|
*/
|
2021-10-13 09:47:50 +02:00
|
|
|
static noinstr int error_context(struct mce *m, struct pt_regs *regs)
|
2009-05-27 21:56:57 +02:00
|
|
|
{
|
2021-10-13 09:47:50 +02:00
|
|
|
int fixup_type;
|
|
|
|
|
bool copy_user;
|
|
|
|
|
|
2016-02-17 10:20:13 -08:00
|
|
|
if ((m->cs & 3) == 3)
|
|
|
|
|
return IN_USER;
|
2021-10-13 09:47:50 +02:00
|
|
|
|
2020-10-06 14:09:10 -07:00
|
|
|
if (!mc_recoverable(m->mcgstatus))
|
|
|
|
|
return IN_KERNEL;
|
2020-04-07 13:49:58 +02:00
|
|
|
|
2021-10-13 09:47:50 +02:00
|
|
|
/* Allow instrumentation around external facilities usage. */
|
|
|
|
|
instrumentation_begin();
|
|
|
|
|
fixup_type = ex_get_fixup_type(m->ip);
|
|
|
|
|
copy_user = is_copy_from_user(regs);
|
|
|
|
|
instrumentation_end();
|
|
|
|
|
|
|
|
|
|
switch (fixup_type) {
|
2021-09-08 15:29:18 +02:00
|
|
|
case EX_TYPE_UACCESS:
|
|
|
|
|
case EX_TYPE_COPY:
|
2021-12-17 16:49:25 +01:00
|
|
|
if (!copy_user)
|
2021-09-08 15:29:18 +02:00
|
|
|
return IN_KERNEL;
|
2020-10-06 14:09:10 -07:00
|
|
|
m->kflags |= MCE_IN_KERNEL_COPYIN;
|
2021-09-08 15:29:18 +02:00
|
|
|
fallthrough;
|
2021-10-13 09:47:50 +02:00
|
|
|
|
2021-09-08 15:29:19 +02:00
|
|
|
case EX_TYPE_FAULT_MCE_SAFE:
|
|
|
|
|
case EX_TYPE_DEFAULT_MCE_SAFE:
|
2021-09-08 15:29:18 +02:00
|
|
|
m->kflags |= MCE_IN_KERNEL_RECOV;
|
2016-02-17 10:20:13 -08:00
|
|
|
return IN_KERNEL_RECOV;
|
2021-10-13 09:47:50 +02:00
|
|
|
|
2021-09-08 15:29:18 +02:00
|
|
|
default:
|
|
|
|
|
return IN_KERNEL;
|
2020-04-07 13:49:58 +02:00
|
|
|
}
|
2009-05-27 21:56:57 +02:00
|
|
|
}
|
|
|
|
|
|
2022-04-05 13:32:13 -05:00
|
|
|
/* See AMD PPR(s) section Machine Check Error Handling. */
|
|
|
|
|
static noinstr int mce_severity_amd(struct mce *m, struct pt_regs *regs, char **msg, bool is_excp)
|
2016-04-30 14:33:52 +02:00
|
|
|
{
|
2022-04-05 13:32:14 -05:00
|
|
|
char *panic_msg = NULL;
|
2022-04-05 13:32:13 -05:00
|
|
|
int ret;
|
2016-04-30 14:33:52 +02:00
|
|
|
|
|
|
|
|
/*
|
2022-04-05 13:32:13 -05:00
|
|
|
* Default return value: Action required, the error must be handled
|
|
|
|
|
* immediately.
|
2016-04-30 14:33:52 +02:00
|
|
|
*/
|
2022-04-05 13:32:13 -05:00
|
|
|
ret = MCE_AR_SEVERITY;
|
2015-03-23 10:42:53 -05:00
|
|
|
|
2015-03-23 10:42:52 -05:00
|
|
|
/* Processor Context Corrupt, no need to fumble too much, die! */
|
2022-04-05 13:32:13 -05:00
|
|
|
if (m->status & MCI_STATUS_PCC) {
|
2022-04-05 13:32:14 -05:00
|
|
|
panic_msg = "Processor Context Corrupt";
|
2022-04-05 13:32:13 -05:00
|
|
|
ret = MCE_PANIC_SEVERITY;
|
|
|
|
|
goto out;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (m->status & MCI_STATUS_DEFERRED) {
|
|
|
|
|
ret = MCE_DEFERRED_SEVERITY;
|
|
|
|
|
goto out;
|
2015-03-23 10:42:52 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*
|
2022-04-05 13:32:13 -05:00
|
|
|
* If the UC bit is not set, the system either corrected or deferred
|
|
|
|
|
* the error. No action will be required after logging the error.
|
2015-03-23 10:42:52 -05:00
|
|
|
*/
|
2022-04-05 13:32:13 -05:00
|
|
|
if (!(m->status & MCI_STATUS_UC)) {
|
|
|
|
|
ret = MCE_KEEP_SEVERITY;
|
|
|
|
|
goto out;
|
|
|
|
|
}
|
2015-03-23 10:42:52 -05:00
|
|
|
|
|
|
|
|
/*
|
2022-04-05 13:32:13 -05:00
|
|
|
* On MCA overflow, without the MCA overflow recovery feature the
|
|
|
|
|
* system will not be able to recover, panic.
|
2015-03-23 10:42:52 -05:00
|
|
|
*/
|
2022-04-05 13:32:13 -05:00
|
|
|
if ((m->status & MCI_STATUS_OVER) && !mce_flags.overflow_recov) {
|
2022-04-05 13:32:14 -05:00
|
|
|
panic_msg = "Overflowed uncorrected error without MCA Overflow Recovery";
|
2022-04-05 13:32:13 -05:00
|
|
|
ret = MCE_PANIC_SEVERITY;
|
|
|
|
|
goto out;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!mce_flags.succor) {
|
2022-04-05 13:32:14 -05:00
|
|
|
panic_msg = "Uncorrected error without MCA Recovery";
|
2022-04-05 13:32:13 -05:00
|
|
|
ret = MCE_PANIC_SEVERITY;
|
|
|
|
|
goto out;
|
|
|
|
|
}
|
|
|
|
|
|
2022-04-05 13:32:14 -05:00
|
|
|
if (error_context(m, regs) == IN_KERNEL) {
|
|
|
|
|
panic_msg = "Uncorrected unrecoverable error in kernel context";
|
2022-04-05 13:32:13 -05:00
|
|
|
ret = MCE_PANIC_SEVERITY;
|
2022-04-05 13:32:14 -05:00
|
|
|
}
|
2022-04-05 13:32:13 -05:00
|
|
|
|
|
|
|
|
out:
|
2022-04-05 13:32:14 -05:00
|
|
|
if (msg && panic_msg)
|
|
|
|
|
*msg = panic_msg;
|
|
|
|
|
|
2022-04-05 13:32:13 -05:00
|
|
|
return ret;
|
2015-03-23 10:42:52 -05:00
|
|
|
}
|
|
|
|
|
|
2021-12-20 21:43:28 +01:00
|
|
|
static noinstr int mce_severity_intel(struct mce *m, struct pt_regs *regs, char **msg, bool is_excp)
|
2009-05-27 21:56:54 +02:00
|
|
|
{
|
2014-11-18 10:09:19 +08:00
|
|
|
enum exception excp = (is_excp ? EXCP_CONTEXT : NO_EXCP);
|
2020-10-06 14:09:05 -07:00
|
|
|
enum context ctx = error_context(m, regs);
|
2009-05-27 21:56:54 +02:00
|
|
|
struct severity *s;
|
2009-05-27 21:56:57 +02:00
|
|
|
|
2009-05-27 21:56:54 +02:00
|
|
|
for (s = severities;; s++) {
|
2011-06-08 10:55:05 +09:00
|
|
|
if ((m->status & s->mask) != s->result)
|
2009-05-27 21:56:54 +02:00
|
|
|
continue;
|
2011-06-08 10:55:05 +09:00
|
|
|
if ((m->mcgstatus & s->mcgmask) != s->mcgres)
|
2009-05-27 21:56:54 +02:00
|
|
|
continue;
|
2012-10-17 12:05:33 +02:00
|
|
|
if (s->ser == SER_REQUIRED && !mca_cfg.ser)
|
2009-05-27 21:56:57 +02:00
|
|
|
continue;
|
2012-10-17 12:05:33 +02:00
|
|
|
if (s->ser == NO_SER && mca_cfg.ser)
|
2009-05-27 21:56:57 +02:00
|
|
|
continue;
|
|
|
|
|
if (s->context && ctx != s->context)
|
|
|
|
|
continue;
|
2014-11-18 10:09:19 +08:00
|
|
|
if (s->excp && excp != s->excp)
|
|
|
|
|
continue;
|
2020-09-29 19:13:12 -07:00
|
|
|
if (s->cpu_model && boot_cpu_data.x86_model != s->cpu_model)
|
|
|
|
|
continue;
|
|
|
|
|
if (s->cpu_minstepping && boot_cpu_data.x86_stepping < s->cpu_minstepping)
|
|
|
|
|
continue;
|
|
|
|
|
if (s->bank_lo && (m->bank < s->bank_lo || m->bank > s->bank_hi))
|
|
|
|
|
continue;
|
2009-05-27 21:56:54 +02:00
|
|
|
if (msg)
|
|
|
|
|
*msg = s->msg;
|
2009-05-27 21:56:57 +02:00
|
|
|
s->covered = 1;
|
2021-12-20 21:43:28 +01:00
|
|
|
|
|
|
|
|
if (s->sev >= MCE_UC_SEVERITY && ctx == IN_KERNEL)
|
|
|
|
|
return MCE_PANIC_SEVERITY;
|
|
|
|
|
|
2009-05-27 21:56:54 +02:00
|
|
|
return s->sev;
|
|
|
|
|
}
|
|
|
|
|
}
|
2009-05-27 21:56:57 +02:00
|
|
|
|
2021-12-20 21:43:28 +01:00
|
|
|
int noinstr mce_severity(struct mce *m, struct pt_regs *regs, char **msg, bool is_excp)
|
2015-03-23 10:42:53 -05:00
|
|
|
{
|
2018-09-23 17:36:04 +08:00
|
|
|
if (boot_cpu_data.x86_vendor == X86_VENDOR_AMD ||
|
|
|
|
|
boot_cpu_data.x86_vendor == X86_VENDOR_HYGON)
|
2021-12-20 21:43:28 +01:00
|
|
|
return mce_severity_amd(m, regs, msg, is_excp);
|
2021-09-01 17:02:58 +02:00
|
|
|
else
|
2021-12-20 21:43:28 +01:00
|
|
|
return mce_severity_intel(m, regs, msg, is_excp);
|
2015-03-23 10:42:53 -05:00
|
|
|
}
|
|
|
|
|
|
2009-09-14 20:52:25 +02:00
|
|
|
#ifdef CONFIG_DEBUG_FS
|
2009-05-27 21:56:57 +02:00
|
|
|
static void *s_start(struct seq_file *f, loff_t *pos)
|
|
|
|
|
{
|
|
|
|
|
if (*pos >= ARRAY_SIZE(severities))
|
|
|
|
|
return NULL;
|
|
|
|
|
return &severities[*pos];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void *s_next(struct seq_file *f, void *data, loff_t *pos)
|
|
|
|
|
{
|
|
|
|
|
if (++(*pos) >= ARRAY_SIZE(severities))
|
|
|
|
|
return NULL;
|
|
|
|
|
return &severities[*pos];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void s_stop(struct seq_file *f, void *data)
|
|
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int s_show(struct seq_file *f, void *data)
|
|
|
|
|
{
|
|
|
|
|
struct severity *ser = data;
|
|
|
|
|
seq_printf(f, "%d\t%s\n", ser->covered, ser->msg);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct seq_operations severities_seq_ops = {
|
|
|
|
|
.start = s_start,
|
|
|
|
|
.next = s_next,
|
|
|
|
|
.stop = s_stop,
|
|
|
|
|
.show = s_show,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static int severities_coverage_open(struct inode *inode, struct file *file)
|
|
|
|
|
{
|
|
|
|
|
return seq_open(file, &severities_seq_ops);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static ssize_t severities_coverage_write(struct file *file,
|
|
|
|
|
const char __user *ubuf,
|
|
|
|
|
size_t count, loff_t *ppos)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(severities); i++)
|
|
|
|
|
severities[i].covered = 0;
|
|
|
|
|
return count;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct file_operations severities_coverage_fops = {
|
|
|
|
|
.open = severities_coverage_open,
|
|
|
|
|
.release = seq_release,
|
|
|
|
|
.read = seq_read,
|
|
|
|
|
.write = severities_coverage_write,
|
llseek: automatically add .llseek fop
All file_operations should get a .llseek operation so we can make
nonseekable_open the default for future file operations without a
.llseek pointer.
The three cases that we can automatically detect are no_llseek, seq_lseek
and default_llseek. For cases where we can we can automatically prove that
the file offset is always ignored, we use noop_llseek, which maintains
the current behavior of not returning an error from a seek.
New drivers should normally not use noop_llseek but instead use no_llseek
and call nonseekable_open at open time. Existing drivers can be converted
to do the same when the maintainer knows for certain that no user code
relies on calling seek on the device file.
The generated code is often incorrectly indented and right now contains
comments that clarify for each added line why a specific variant was
chosen. In the version that gets submitted upstream, the comments will
be gone and I will manually fix the indentation, because there does not
seem to be a way to do that using coccinelle.
Some amount of new code is currently sitting in linux-next that should get
the same modifications, which I will do at the end of the merge window.
Many thanks to Julia Lawall for helping me learn to write a semantic
patch that does all this.
===== begin semantic patch =====
// This adds an llseek= method to all file operations,
// as a preparation for making no_llseek the default.
//
// The rules are
// - use no_llseek explicitly if we do nonseekable_open
// - use seq_lseek for sequential files
// - use default_llseek if we know we access f_pos
// - use noop_llseek if we know we don't access f_pos,
// but we still want to allow users to call lseek
//
@ open1 exists @
identifier nested_open;
@@
nested_open(...)
{
<+...
nonseekable_open(...)
...+>
}
@ open exists@
identifier open_f;
identifier i, f;
identifier open1.nested_open;
@@
int open_f(struct inode *i, struct file *f)
{
<+...
(
nonseekable_open(...)
|
nested_open(...)
)
...+>
}
@ read disable optional_qualifier exists @
identifier read_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
expression E;
identifier func;
@@
ssize_t read_f(struct file *f, char *p, size_t s, loff_t *off)
{
<+...
(
*off = E
|
*off += E
|
func(..., off, ...)
|
E = *off
)
...+>
}
@ read_no_fpos disable optional_qualifier exists @
identifier read_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
@@
ssize_t read_f(struct file *f, char *p, size_t s, loff_t *off)
{
... when != off
}
@ write @
identifier write_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
expression E;
identifier func;
@@
ssize_t write_f(struct file *f, const char *p, size_t s, loff_t *off)
{
<+...
(
*off = E
|
*off += E
|
func(..., off, ...)
|
E = *off
)
...+>
}
@ write_no_fpos @
identifier write_f;
identifier f, p, s, off;
type ssize_t, size_t, loff_t;
@@
ssize_t write_f(struct file *f, const char *p, size_t s, loff_t *off)
{
... when != off
}
@ fops0 @
identifier fops;
@@
struct file_operations fops = {
...
};
@ has_llseek depends on fops0 @
identifier fops0.fops;
identifier llseek_f;
@@
struct file_operations fops = {
...
.llseek = llseek_f,
...
};
@ has_read depends on fops0 @
identifier fops0.fops;
identifier read_f;
@@
struct file_operations fops = {
...
.read = read_f,
...
};
@ has_write depends on fops0 @
identifier fops0.fops;
identifier write_f;
@@
struct file_operations fops = {
...
.write = write_f,
...
};
@ has_open depends on fops0 @
identifier fops0.fops;
identifier open_f;
@@
struct file_operations fops = {
...
.open = open_f,
...
};
// use no_llseek if we call nonseekable_open
////////////////////////////////////////////
@ nonseekable1 depends on !has_llseek && has_open @
identifier fops0.fops;
identifier nso ~= "nonseekable_open";
@@
struct file_operations fops = {
... .open = nso, ...
+.llseek = no_llseek, /* nonseekable */
};
@ nonseekable2 depends on !has_llseek @
identifier fops0.fops;
identifier open.open_f;
@@
struct file_operations fops = {
... .open = open_f, ...
+.llseek = no_llseek, /* open uses nonseekable */
};
// use seq_lseek for sequential files
/////////////////////////////////////
@ seq depends on !has_llseek @
identifier fops0.fops;
identifier sr ~= "seq_read";
@@
struct file_operations fops = {
... .read = sr, ...
+.llseek = seq_lseek, /* we have seq_read */
};
// use default_llseek if there is a readdir
///////////////////////////////////////////
@ fops1 depends on !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier readdir_e;
@@
// any other fop is used that changes pos
struct file_operations fops = {
... .readdir = readdir_e, ...
+.llseek = default_llseek, /* readdir is present */
};
// use default_llseek if at least one of read/write touches f_pos
/////////////////////////////////////////////////////////////////
@ fops2 depends on !fops1 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier read.read_f;
@@
// read fops use offset
struct file_operations fops = {
... .read = read_f, ...
+.llseek = default_llseek, /* read accesses f_pos */
};
@ fops3 depends on !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier write.write_f;
@@
// write fops use offset
struct file_operations fops = {
... .write = write_f, ...
+ .llseek = default_llseek, /* write accesses f_pos */
};
// Use noop_llseek if neither read nor write accesses f_pos
///////////////////////////////////////////////////////////
@ fops4 depends on !fops1 && !fops2 && !fops3 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier read_no_fpos.read_f;
identifier write_no_fpos.write_f;
@@
// write fops use offset
struct file_operations fops = {
...
.write = write_f,
.read = read_f,
...
+.llseek = noop_llseek, /* read and write both use no f_pos */
};
@ depends on has_write && !has_read && !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier write_no_fpos.write_f;
@@
struct file_operations fops = {
... .write = write_f, ...
+.llseek = noop_llseek, /* write uses no f_pos */
};
@ depends on has_read && !has_write && !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
identifier read_no_fpos.read_f;
@@
struct file_operations fops = {
... .read = read_f, ...
+.llseek = noop_llseek, /* read uses no f_pos */
};
@ depends on !has_read && !has_write && !fops1 && !fops2 && !has_llseek && !nonseekable1 && !nonseekable2 && !seq @
identifier fops0.fops;
@@
struct file_operations fops = {
...
+.llseek = noop_llseek, /* no read or write fn */
};
===== End semantic patch =====
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Cc: Julia Lawall <julia@diku.dk>
Cc: Christoph Hellwig <hch@infradead.org>
2010-08-15 18:52:59 +02:00
|
|
|
.llseek = seq_lseek,
|
2009-05-27 21:56:57 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static int __init severities_debugfs_init(void)
|
|
|
|
|
{
|
2019-06-12 17:15:31 +02:00
|
|
|
struct dentry *dmce;
|
2009-05-27 21:56:57 +02:00
|
|
|
|
2009-07-31 09:41:42 +08:00
|
|
|
dmce = mce_get_debugfs_dir();
|
2009-05-27 21:56:57 +02:00
|
|
|
|
2019-06-12 17:15:31 +02:00
|
|
|
debugfs_create_file("severities-coverage", 0444, dmce, NULL,
|
|
|
|
|
&severities_coverage_fops);
|
2009-05-27 21:56:57 +02:00
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
late_initcall(severities_debugfs_init);
|
2011-06-08 10:55:05 +09:00
|
|
|
#endif /* CONFIG_DEBUG_FS */
|