On Tue, Sep 03, 2019 at 08:16:04PM +1000, Oliver O'Halloran wrote:
> Add an interface to debugfs for generating an EEH event on a given device.
> This works by disabling memory accesses to and from the device by setting
> the PCI_COMMAND register (or the VF Memory Space Enable on the parent PF).
> 
> This is a somewhat portable alternative to using the platform specific
> error injection mechanisms since those tend to be either hard to use, or
> straight up broken. For pseries the interfaces also requires the use of
> /dev/mem which is probably going to go away in a post-LOCKDOWN world
> (and it's a horrific hack to begin with) so moving to a kernel-provided
> interface makes sense and provides a sane, cross-platform interface for
> userspace so we can write more generic testing scripts.
> 
> Signed-off-by: Oliver O'Halloran <ooh...@gmail.com>

Looks good to me. Tested with the previous patch.

Tested-by: Sam Bobroff <sbobr...@linux.ibm.com>
Reviewed-by: Sam Bobroff <sbobr...@linux.ibm.com>

> ---
>  arch/powerpc/kernel/eeh.c | 139 +++++++++++++++++++++++++++++++++++++-
>  1 file changed, 138 insertions(+), 1 deletion(-)
> 
> diff --git a/arch/powerpc/kernel/eeh.c b/arch/powerpc/kernel/eeh.c
> index ace1c5a6b8ed..a55d2f01da1d 100644
> --- a/arch/powerpc/kernel/eeh.c
> +++ b/arch/powerpc/kernel/eeh.c
> @@ -1894,7 +1894,8 @@ static ssize_t eeh_dev_check_write(struct file *filp,
>       char buf[20];
>       int ret;
>  
> -     ret = simple_write_to_buffer(buf, sizeof(buf), ppos, user_buf, count);
> +     memset(buf, 0, sizeof(buf));
> +     ret = simple_write_to_buffer(buf, sizeof(buf)-1, ppos, user_buf, count);
>       if (!ret)
>               return -EFAULT;
>  
> @@ -1931,6 +1932,139 @@ static const struct file_operations 
> eeh_dev_check_fops = {
>       .read   = eeh_debugfs_dev_usage,
>  };
>  
> +static int eeh_debugfs_break_device(struct pci_dev *pdev)
> +{
> +     struct resource *bar = NULL;
> +     void __iomem *mapped;
> +     u16 old, bit;
> +     int i, pos;
> +
> +     /* Do we have an MMIO BAR to disable? */
> +     for (i = 0; i <= PCI_STD_RESOURCE_END; i++) {
> +             struct resource *r = &pdev->resource[i];
> +
> +             if (!r->flags || !r->start)
> +                     continue;
> +             if (r->flags & IORESOURCE_IO)
> +                     continue;
> +             if (r->flags & IORESOURCE_UNSET)
> +                     continue;
> +
> +             bar = r;
> +             break;
> +     }
> +
> +     if (!bar) {
> +             pci_err(pdev, "Unable to find Memory BAR to cause EEH with\n");
> +             return -ENXIO;
> +     }
> +
> +     pci_err(pdev, "Going to break: %pR\n", bar);
> +
> +     if (pdev->is_virtfn) {
> +#ifndef CONFIG_IOV
> +             return -ENXIO;
> +#else
> +             /*
> +              * VFs don't have a per-function COMMAND register, so the best
> +              * we can do is clear the Memory Space Enable bit in the PF's
> +              * SRIOV control reg.
> +              *
> +              * Unfortunately, this requires that we have a PF (i.e doesn't
> +              * work for a passed-through VF) and it has the potential side
> +              * effect of also causing an EEH on every other VF under the
> +              * PF. Oh well.
> +              */
> +             pdev = pdev->physfn;
> +             if (!pdev)
> +                     return -ENXIO; /* passed through VFs have no PF */
> +
> +             pos  = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_SRIOV);
> +             pos += PCI_SRIOV_CTRL;
> +             bit  = PCI_SRIOV_CTRL_MSE;
> +#endif /* !CONFIG_IOV */
> +     } else {
> +             bit = PCI_COMMAND_MEMORY;
> +             pos = PCI_COMMAND;
> +     }
> +
> +     /*
> +      * Process here is:
> +      *
> +      * 1. Disable Memory space.
> +      *
> +      * 2. Perform an MMIO to the device. This should result in an error
> +      *    (CA  / UR) being raised by the device which results in an EEH
> +      *    PE freeze. Using the in_8() accessor skips the eeh detection hook
> +      *    so the freeze hook so the EEH Detection machinery won't be
> +      *    triggered here. This is to match the usual behaviour of EEH
> +      *    where the HW will asyncronously freeze a PE and it's up to
> +      *    the kernel to notice and deal with it.
> +      *
> +      * 3. Turn Memory space back on. This is more important for VFs
> +      *    since recovery will probably fail if we don't. For normal
> +      *    the COMMAND register is reset as a part of re-initialising
> +      *    the device.
> +      *
> +      * Breaking stuff is the point so who cares if it's racy ;)
> +      */
> +     pci_read_config_word(pdev, pos, &old);
> +
> +     mapped = ioremap(bar->start, PAGE_SIZE);
> +     if (!mapped) {
> +             pci_err(pdev, "Unable to map MMIO BAR %pR\n", bar);
> +             return -ENXIO;
> +     }
> +
> +     pci_write_config_word(pdev, pos, old & ~bit);
> +     in_8(mapped);
> +     pci_write_config_word(pdev, pos, old);
> +
> +     iounmap(mapped);
> +
> +     return 0;
> +}
> +
> +static ssize_t eeh_dev_break_write(struct file *filp,
> +                             const char __user *user_buf,
> +                             size_t count, loff_t *ppos)
> +{
> +     uint32_t domain, bus, dev, fn;
> +     struct pci_dev *pdev;
> +     char buf[20];
> +     int ret;
> +
> +     memset(buf, 0, sizeof(buf));
> +     ret = simple_write_to_buffer(buf, sizeof(buf)-1, ppos, user_buf, count);
> +     if (!ret)
> +             return -EFAULT;
> +
> +     ret = sscanf(buf, "%x:%x:%x.%x", &domain, &bus, &dev, &fn);
> +     if (ret != 4) {
> +             pr_err("%s: expected 4 args, got %d\n", __func__, ret);
> +             return -EINVAL;
> +     }
> +
> +     pdev = pci_get_domain_bus_and_slot(domain, bus, (dev << 3) | fn);
> +     if (!pdev)
> +             return -ENODEV;
> +
> +     ret = eeh_debugfs_break_device(pdev);
> +     pci_dev_put(pdev);
> +
> +     if (ret < 0)
> +             return ret;
> +
> +     return count;
> +}
> +
> +static const struct file_operations eeh_dev_break_fops = {
> +     .open   = simple_open,
> +     .llseek = no_llseek,
> +     .write  = eeh_dev_break_write,
> +     .read   = eeh_debugfs_dev_usage,
> +};
> +
>  #endif
>  
>  static int __init eeh_init_proc(void)
> @@ -1949,6 +2083,9 @@ static int __init eeh_init_proc(void)
>               debugfs_create_file_unsafe("eeh_dev_check", 0600,
>                               powerpc_debugfs_root, NULL,
>                               &eeh_dev_check_fops);
> +             debugfs_create_file_unsafe("eeh_dev_break", 0600,
> +                             powerpc_debugfs_root, NULL,
> +                             &eeh_dev_break_fops);
>               debugfs_create_file_unsafe("eeh_force_recover", 0600,
>                               powerpc_debugfs_root, NULL,
>                               &eeh_force_recover_fops);
> -- 
> 2.21.0
> 

Attachment: signature.asc
Description: PGP signature

Reply via email to