On Tue, Sep 03, 2019 at 08:16:03PM +1000, Oliver O'Halloran wrote: > Detecting an frozen EEH PE usually occurs when an MMIO load returns a 0xFFs > response. When performing EEH testing using the EEH error injection feature > available on some platforms there is no simple way to kick-off the kernel's > recovery process since any accesses from userspace (usually /dev/mem) will > bypass the MMIO helpers in the kernel which check if a 0xFF response is due > to an EEH freeze or not. > > If a device contains a 0xFF byte in it's config space it's possible to > trigger the recovery process via config space read from userspace, but this > is not a reliable method. If a driver is bound to the device an in use it > will frequently trigger the MMIO check, but this is also inconsistent. > > To solve these problems this patch adds a debugfs file called > "eeh_dev_check" which accepts a <domain>:<bus>:<dev>.<fn> string and runs > eeh_dev_check_failure() on it. This is the same check that's done when the > kernel gets a 0xFF result from an config or MMIO read with the added > benifit that it can be reliably triggered from userspace. > > Signed-off-by: Oliver O'Halloran <ooh...@gmail.com>
Looks good, and I tested it with the next patch and it seems to work. But I think you should make it clear that this does not work with the hardware "EEH error injection" facility accessible via debugfs in err_injct (that doesn't seem clear to me from the commit message). Tested-by: Sam Bobroff <sbobr...@linux.ibm.com> Reviewed-by: Sam Bobroff <sbobr...@linux.ibm.com> > --- > arch/powerpc/kernel/eeh.c | 61 +++++++++++++++++++++++++++++++++++++++ > 1 file changed, 61 insertions(+) > > diff --git a/arch/powerpc/kernel/eeh.c b/arch/powerpc/kernel/eeh.c > index 46d17817b438..ace1c5a6b8ed 100644 > --- a/arch/powerpc/kernel/eeh.c > +++ b/arch/powerpc/kernel/eeh.c > @@ -1873,6 +1873,64 @@ static const struct file_operations > eeh_force_recover_fops = { > .llseek = no_llseek, > .write = eeh_force_recover_write, > }; > + > +static ssize_t eeh_debugfs_dev_usage(struct file *filp, > + char __user *user_buf, > + size_t count, loff_t *ppos) > +{ > + static const char usage[] = "input format: <domain>:<bus>:<dev>.<fn>\n"; > + > + return simple_read_from_buffer(user_buf, count, ppos, > + usage, sizeof(usage) - 1); > +} > + > +static ssize_t eeh_dev_check_write(struct file *filp, > + const char __user *user_buf, > + size_t count, loff_t *ppos) > +{ > + uint32_t domain, bus, dev, fn; > + struct pci_dev *pdev; > + struct eeh_dev *edev; > + char buf[20]; > + int ret; > + > + ret = simple_write_to_buffer(buf, sizeof(buf), ppos, user_buf, count); > + if (!ret) > + return -EFAULT; > + > + ret = sscanf(buf, "%x:%x:%x.%x", &domain, &bus, &dev, &fn); > + if (ret != 4) { > + pr_err("%s: expected 4 args, got %d\n", __func__, ret); > + return -EINVAL; > + } > + > + pdev = pci_get_domain_bus_and_slot(domain, bus, (dev << 3) | fn); > + if (!pdev) > + return -ENODEV; > + > + edev = pci_dev_to_eeh_dev(pdev); > + if (!edev) { > + pci_err(pdev, "No eeh_dev for this device!\n"); > + pci_dev_put(pdev); > + return -ENODEV; > + } > + > + ret = eeh_dev_check_failure(edev); > + pci_info(pdev, "eeh_dev_check_failure(%04x:%02x:%02x.%01x) = %d\n", > + domain, bus, dev, fn, ret); > + > + pci_dev_put(pdev); > + > + return count; > +} > + > +static const struct file_operations eeh_dev_check_fops = { > + .open = simple_open, > + .llseek = no_llseek, > + .write = eeh_dev_check_write, > + .read = eeh_debugfs_dev_usage, > +}; > + > #endif > > static int __init eeh_init_proc(void) > @@ -1888,6 +1946,9 @@ static int __init eeh_init_proc(void) > debugfs_create_bool("eeh_disable_recovery", 0600, > powerpc_debugfs_root, > &eeh_debugfs_no_recover); > + debugfs_create_file_unsafe("eeh_dev_check", 0600, > + powerpc_debugfs_root, NULL, > + &eeh_dev_check_fops); > debugfs_create_file_unsafe("eeh_force_recover", 0600, > powerpc_debugfs_root, NULL, > &eeh_force_recover_fops); > -- > 2.21.0 >
signature.asc
Description: PGP signature