aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorIan Munsie <imunsie@au1.ibm.com>2015-07-23 02:43:56 -0400
committerMichael Ellerman <mpe@ellerman.id.au>2015-08-18 05:34:43 -0400
commitd9232a3da8683cd9c9854a858bcca968fe5f3bca (patch)
tree214a1899151e0b15b4d4e78749635fc2046a7722
parentfc9e9cbf4e48f28525edd27e285820988f1a54b1 (diff)
cxl: Add alternate MMIO error handling
userspace programs using cxl currently have to use two strategies for dealing with MMIO errors simultaneously. They have to check every read for a return of all Fs in case the adapter has gone away and the kernel has not yet noticed, and they have to deal with SIGBUS in case the kernel has already noticed, invalidated the mapping and marked the context as failed. In order to simplify things, this patch adds an alternative approach where the kernel will return a page filled with Fs instead of delivering a SIGBUS. This allows userspace to only need to deal with one of these two error paths, and is intended for use in libraries that use cxl transparently and may not be able to safely install a signal handler. This approach will only work if certain constraints are met. Namely, if the application is both reading and writing to an address in the problem state area it cannot assume that a non-FF read is OK, as it may just be reading out a value it has previously written. Further - since only one page is used per context a write to a given offset would be visible when reading the same offset from a different page in the mapping (this only applies within a single context, not between contexts). An application could deal with this by e.g. making sure it also reads from a read-only offset after any reads to a read/write offset. Due to these constraints, this functionality must be explicitly requested by userspace when starting the context by passing in the CXL_START_WORK_ERR_FF flag. Signed-off-by: Ian Munsie <imunsie@au1.ibm.com> Acked-by: Michael Neuling <mikey@neuling.org> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
-rw-r--r--drivers/misc/cxl/context.c14
-rw-r--r--drivers/misc/cxl/cxl.h4
-rw-r--r--drivers/misc/cxl/file.c4
-rw-r--r--include/uapi/misc/cxl.h4
4 files changed, 23 insertions, 3 deletions
diff --git a/drivers/misc/cxl/context.c b/drivers/misc/cxl/context.c
index 615842115848..941fda04aa9a 100644
--- a/drivers/misc/cxl/context.c
+++ b/drivers/misc/cxl/context.c
@@ -126,6 +126,18 @@ static int cxl_mmap_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
126 if (ctx->status != STARTED) { 126 if (ctx->status != STARTED) {
127 mutex_unlock(&ctx->status_mutex); 127 mutex_unlock(&ctx->status_mutex);
128 pr_devel("%s: Context not started, failing problem state access\n", __func__); 128 pr_devel("%s: Context not started, failing problem state access\n", __func__);
129 if (ctx->mmio_err_ff) {
130 if (!ctx->ff_page) {
131 ctx->ff_page = alloc_page(GFP_USER);
132 if (!ctx->ff_page)
133 return VM_FAULT_OOM;
134 memset(page_address(ctx->ff_page), 0xff, PAGE_SIZE);
135 }
136 get_page(ctx->ff_page);
137 vmf->page = ctx->ff_page;
138 vma->vm_page_prot = pgprot_cached(vma->vm_page_prot);
139 return 0;
140 }
129 return VM_FAULT_SIGBUS; 141 return VM_FAULT_SIGBUS;
130 } 142 }
131 143
@@ -257,6 +269,8 @@ static void reclaim_ctx(struct rcu_head *rcu)
257 struct cxl_context *ctx = container_of(rcu, struct cxl_context, rcu); 269 struct cxl_context *ctx = container_of(rcu, struct cxl_context, rcu);
258 270
259 free_page((u64)ctx->sstp); 271 free_page((u64)ctx->sstp);
272 if (ctx->ff_page)
273 __free_page(ctx->ff_page);
260 ctx->sstp = NULL; 274 ctx->sstp = NULL;
261 275
262 kfree(ctx); 276 kfree(ctx);
diff --git a/drivers/misc/cxl/cxl.h b/drivers/misc/cxl/cxl.h
index 6f5386653dae..e7af256f60c5 100644
--- a/drivers/misc/cxl/cxl.h
+++ b/drivers/misc/cxl/cxl.h
@@ -34,7 +34,7 @@ extern uint cxl_verbose;
34 * Bump version each time a user API change is made, whether it is 34 * Bump version each time a user API change is made, whether it is
35 * backwards compatible ot not. 35 * backwards compatible ot not.
36 */ 36 */
37#define CXL_API_VERSION 1 37#define CXL_API_VERSION 2
38#define CXL_API_VERSION_COMPATIBLE 1 38#define CXL_API_VERSION_COMPATIBLE 1
39 39
40/* 40/*
@@ -418,6 +418,8 @@ struct cxl_context {
418 /* Used to unmap any mmaps when force detaching */ 418 /* Used to unmap any mmaps when force detaching */
419 struct address_space *mapping; 419 struct address_space *mapping;
420 struct mutex mapping_lock; 420 struct mutex mapping_lock;
421 struct page *ff_page;
422 bool mmio_err_ff;
421 423
422 spinlock_t sste_lock; /* Protects segment table entries */ 424 spinlock_t sste_lock; /* Protects segment table entries */
423 struct cxl_sste *sstp; 425 struct cxl_sste *sstp;
diff --git a/drivers/misc/cxl/file.c b/drivers/misc/cxl/file.c
index 57bdb473749f..a30bf285b5bd 100644
--- a/drivers/misc/cxl/file.c
+++ b/drivers/misc/cxl/file.c
@@ -184,6 +184,8 @@ static long afu_ioctl_start_work(struct cxl_context *ctx,
184 if (work.flags & CXL_START_WORK_AMR) 184 if (work.flags & CXL_START_WORK_AMR)
185 amr = work.amr & mfspr(SPRN_UAMOR); 185 amr = work.amr & mfspr(SPRN_UAMOR);
186 186
187 ctx->mmio_err_ff = !!(work.flags & CXL_START_WORK_ERR_FF);
188
187 /* 189 /*
188 * We grab the PID here and not in the file open to allow for the case 190 * We grab the PID here and not in the file open to allow for the case
189 * where a process (master, some daemon, etc) has opened the chardev on 191 * where a process (master, some daemon, etc) has opened the chardev on
@@ -538,7 +540,7 @@ int __init cxl_file_init(void)
538 * If these change we really need to update API. Either change some 540 * If these change we really need to update API. Either change some
539 * flags or update API version number CXL_API_VERSION. 541 * flags or update API version number CXL_API_VERSION.
540 */ 542 */
541 BUILD_BUG_ON(CXL_API_VERSION != 1); 543 BUILD_BUG_ON(CXL_API_VERSION != 2);
542 BUILD_BUG_ON(sizeof(struct cxl_ioctl_start_work) != 64); 544 BUILD_BUG_ON(sizeof(struct cxl_ioctl_start_work) != 64);
543 BUILD_BUG_ON(sizeof(struct cxl_event_header) != 8); 545 BUILD_BUG_ON(sizeof(struct cxl_event_header) != 8);
544 BUILD_BUG_ON(sizeof(struct cxl_event_afu_interrupt) != 8); 546 BUILD_BUG_ON(sizeof(struct cxl_event_afu_interrupt) != 8);
diff --git a/include/uapi/misc/cxl.h b/include/uapi/misc/cxl.h
index 99a8ca15fe64..1e889aa8a36e 100644
--- a/include/uapi/misc/cxl.h
+++ b/include/uapi/misc/cxl.h
@@ -29,8 +29,10 @@ struct cxl_ioctl_start_work {
29 29
30#define CXL_START_WORK_AMR 0x0000000000000001ULL 30#define CXL_START_WORK_AMR 0x0000000000000001ULL
31#define CXL_START_WORK_NUM_IRQS 0x0000000000000002ULL 31#define CXL_START_WORK_NUM_IRQS 0x0000000000000002ULL
32#define CXL_START_WORK_ERR_FF 0x0000000000000004ULL
32#define CXL_START_WORK_ALL (CXL_START_WORK_AMR |\ 33#define CXL_START_WORK_ALL (CXL_START_WORK_AMR |\
33 CXL_START_WORK_NUM_IRQS) 34 CXL_START_WORK_NUM_IRQS |\
35 CXL_START_WORK_ERR_FF)
34 36
35 37
36/* Possible modes that an afu can be in */ 38/* Possible modes that an afu can be in */