1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * APEI Error INJection support 4 * 5 * EINJ provides a hardware error injection mechanism, this is useful 6 * for debugging and testing of other APEI and RAS features. 7 * 8 * For more information about EINJ, please refer to ACPI Specification 9 * version 4.0, section 17.5. 10 * 11 * Copyright 2009-2010 Intel Corp. 12 * Author: Huang Ying <ying.huang@intel.com> 13 */ 14 15 #include <linux/kernel.h> 16 #include <linux/module.h> 17 #include <linux/init.h> 18 #include <linux/io.h> 19 #include <linux/debugfs.h> 20 #include <linux/seq_file.h> 21 #include <linux/nmi.h> 22 #include <linux/delay.h> 23 #include <linux/mm.h> 24 #include <asm/unaligned.h> 25 26 #include "apei-internal.h" 27 28 #undef pr_fmt 29 #define pr_fmt(fmt) "EINJ: " fmt 30 31 #define SLEEP_UNIT_MIN 1000 /* 1ms */ 32 #define SLEEP_UNIT_MAX 5000 /* 5ms */ 33 /* Firmware should respond within 1 seconds */ 34 #define FIRMWARE_TIMEOUT (1 * USEC_PER_SEC) 35 #define ACPI5_VENDOR_BIT BIT(31) 36 #define MEM_ERROR_MASK (ACPI_EINJ_MEMORY_CORRECTABLE | \ 37 ACPI_EINJ_MEMORY_UNCORRECTABLE | \ 38 ACPI_EINJ_MEMORY_FATAL) 39 40 /* 41 * ACPI version 5 provides a SET_ERROR_TYPE_WITH_ADDRESS action. 42 */ 43 static int acpi5; 44 45 struct set_error_type_with_address { 46 u32 type; 47 u32 vendor_extension; 48 u32 flags; 49 u32 apicid; 50 u64 memory_address; 51 u64 memory_address_range; 52 u32 pcie_sbdf; 53 }; 54 enum { 55 SETWA_FLAGS_APICID = 1, 56 SETWA_FLAGS_MEM = 2, 57 SETWA_FLAGS_PCIE_SBDF = 4, 58 }; 59 60 /* 61 * Vendor extensions for platform specific operations 62 */ 63 struct vendor_error_type_extension { 64 u32 length; 65 u32 pcie_sbdf; 66 u16 vendor_id; 67 u16 device_id; 68 u8 rev_id; 69 u8 reserved[3]; 70 }; 71 72 static u32 notrigger; 73 74 static u32 vendor_flags; 75 static struct debugfs_blob_wrapper vendor_blob; 76 static char vendor_dev[64]; 77 78 /* 79 * Some BIOSes allow parameters to the SET_ERROR_TYPE entries in the 80 * EINJ table through an unpublished extension. Use with caution as 81 * most will ignore the parameter and make their own choice of address 82 * for error injection. This extension is used only if 83 * param_extension module parameter is specified. 84 */ 85 struct einj_parameter { 86 u64 type; 87 u64 reserved1; 88 u64 reserved2; 89 u64 param1; 90 u64 param2; 91 }; 92 93 #define EINJ_OP_BUSY 0x1 94 #define EINJ_STATUS_SUCCESS 0x0 95 #define EINJ_STATUS_FAIL 0x1 96 #define EINJ_STATUS_INVAL 0x2 97 98 #define EINJ_TAB_ENTRY(tab) \ 99 ((struct acpi_whea_header *)((char *)(tab) + \ 100 sizeof(struct acpi_table_einj))) 101 102 static bool param_extension; 103 module_param(param_extension, bool, 0); 104 105 static struct acpi_table_einj *einj_tab; 106 107 static struct apei_resources einj_resources; 108 109 static struct apei_exec_ins_type einj_ins_type[] = { 110 [ACPI_EINJ_READ_REGISTER] = { 111 .flags = APEI_EXEC_INS_ACCESS_REGISTER, 112 .run = apei_exec_read_register, 113 }, 114 [ACPI_EINJ_READ_REGISTER_VALUE] = { 115 .flags = APEI_EXEC_INS_ACCESS_REGISTER, 116 .run = apei_exec_read_register_value, 117 }, 118 [ACPI_EINJ_WRITE_REGISTER] = { 119 .flags = APEI_EXEC_INS_ACCESS_REGISTER, 120 .run = apei_exec_write_register, 121 }, 122 [ACPI_EINJ_WRITE_REGISTER_VALUE] = { 123 .flags = APEI_EXEC_INS_ACCESS_REGISTER, 124 .run = apei_exec_write_register_value, 125 }, 126 [ACPI_EINJ_NOOP] = { 127 .flags = 0, 128 .run = apei_exec_noop, 129 }, 130 }; 131 132 /* 133 * Prevent EINJ interpreter to run simultaneously, because the 134 * corresponding firmware implementation may not work properly when 135 * invoked simultaneously. 136 */ 137 static DEFINE_MUTEX(einj_mutex); 138 139 static void *einj_param; 140 141 static void einj_exec_ctx_init(struct apei_exec_context *ctx) 142 { 143 apei_exec_ctx_init(ctx, einj_ins_type, ARRAY_SIZE(einj_ins_type), 144 EINJ_TAB_ENTRY(einj_tab), einj_tab->entries); 145 } 146 147 static int __einj_get_available_error_type(u32 *type) 148 { 149 struct apei_exec_context ctx; 150 int rc; 151 152 einj_exec_ctx_init(&ctx); 153 rc = apei_exec_run(&ctx, ACPI_EINJ_GET_ERROR_TYPE); 154 if (rc) 155 return rc; 156 *type = apei_exec_ctx_get_output(&ctx); 157 158 return 0; 159 } 160 161 /* Get error injection capabilities of the platform */ 162 static int einj_get_available_error_type(u32 *type) 163 { 164 int rc; 165 166 mutex_lock(&einj_mutex); 167 rc = __einj_get_available_error_type(type); 168 mutex_unlock(&einj_mutex); 169 170 return rc; 171 } 172 173 static int einj_timedout(u64 *t) 174 { 175 if ((s64)*t < SLEEP_UNIT_MIN) { 176 pr_warn(FW_WARN "Firmware does not respond in time\n"); 177 return 1; 178 } 179 *t -= SLEEP_UNIT_MIN; 180 usleep_range(SLEEP_UNIT_MIN, SLEEP_UNIT_MAX); 181 182 return 0; 183 } 184 185 static void check_vendor_extension(u64 paddr, 186 struct set_error_type_with_address *v5param) 187 { 188 int offset = v5param->vendor_extension; 189 struct vendor_error_type_extension *v; 190 u32 sbdf; 191 192 if (!offset) 193 return; 194 v = acpi_os_map_iomem(paddr + offset, sizeof(*v)); 195 if (!v) 196 return; 197 sbdf = v->pcie_sbdf; 198 sprintf(vendor_dev, "%x:%x:%x.%x vendor_id=%x device_id=%x rev_id=%x\n", 199 sbdf >> 24, (sbdf >> 16) & 0xff, 200 (sbdf >> 11) & 0x1f, (sbdf >> 8) & 0x7, 201 v->vendor_id, v->device_id, v->rev_id); 202 acpi_os_unmap_iomem(v, sizeof(*v)); 203 } 204 205 static void *einj_get_parameter_address(void) 206 { 207 int i; 208 u64 pa_v4 = 0, pa_v5 = 0; 209 struct acpi_whea_header *entry; 210 211 entry = EINJ_TAB_ENTRY(einj_tab); 212 for (i = 0; i < einj_tab->entries; i++) { 213 if (entry->action == ACPI_EINJ_SET_ERROR_TYPE && 214 entry->instruction == ACPI_EINJ_WRITE_REGISTER && 215 entry->register_region.space_id == 216 ACPI_ADR_SPACE_SYSTEM_MEMORY) 217 pa_v4 = get_unaligned(&entry->register_region.address); 218 if (entry->action == ACPI_EINJ_SET_ERROR_TYPE_WITH_ADDRESS && 219 entry->instruction == ACPI_EINJ_WRITE_REGISTER && 220 entry->register_region.space_id == 221 ACPI_ADR_SPACE_SYSTEM_MEMORY) 222 pa_v5 = get_unaligned(&entry->register_region.address); 223 entry++; 224 } 225 if (pa_v5) { 226 struct set_error_type_with_address *v5param; 227 228 v5param = acpi_os_map_iomem(pa_v5, sizeof(*v5param)); 229 if (v5param) { 230 acpi5 = 1; 231 check_vendor_extension(pa_v5, v5param); 232 return v5param; 233 } 234 } 235 if (param_extension && pa_v4) { 236 struct einj_parameter *v4param; 237 238 v4param = acpi_os_map_iomem(pa_v4, sizeof(*v4param)); 239 if (!v4param) 240 return NULL; 241 if (v4param->reserved1 || v4param->reserved2) { 242 acpi_os_unmap_iomem(v4param, sizeof(*v4param)); 243 return NULL; 244 } 245 return v4param; 246 } 247 248 return NULL; 249 } 250 251 /* do sanity check to trigger table */ 252 static int einj_check_trigger_header(struct acpi_einj_trigger *trigger_tab) 253 { 254 if (trigger_tab->header_size != sizeof(struct acpi_einj_trigger)) 255 return -EINVAL; 256 if (trigger_tab->table_size > PAGE_SIZE || 257 trigger_tab->table_size < trigger_tab->header_size) 258 return -EINVAL; 259 if (trigger_tab->entry_count != 260 (trigger_tab->table_size - trigger_tab->header_size) / 261 sizeof(struct acpi_einj_entry)) 262 return -EINVAL; 263 264 return 0; 265 } 266 267 static struct acpi_generic_address *einj_get_trigger_parameter_region( 268 struct acpi_einj_trigger *trigger_tab, u64 param1, u64 param2) 269 { 270 int i; 271 struct acpi_whea_header *entry; 272 273 entry = (struct acpi_whea_header *) 274 ((char *)trigger_tab + sizeof(struct acpi_einj_trigger)); 275 for (i = 0; i < trigger_tab->entry_count; i++) { 276 if (entry->action == ACPI_EINJ_TRIGGER_ERROR && 277 entry->instruction <= ACPI_EINJ_WRITE_REGISTER_VALUE && 278 entry->register_region.space_id == 279 ACPI_ADR_SPACE_SYSTEM_MEMORY && 280 (entry->register_region.address & param2) == (param1 & param2)) 281 return &entry->register_region; 282 entry++; 283 } 284 285 return NULL; 286 } 287 /* Execute instructions in trigger error action table */ 288 static int __einj_error_trigger(u64 trigger_paddr, u32 type, 289 u64 param1, u64 param2) 290 { 291 struct acpi_einj_trigger *trigger_tab = NULL; 292 struct apei_exec_context trigger_ctx; 293 struct apei_resources trigger_resources; 294 struct acpi_whea_header *trigger_entry; 295 struct resource *r; 296 u32 table_size; 297 int rc = -EIO; 298 struct acpi_generic_address *trigger_param_region = NULL; 299 300 r = request_mem_region(trigger_paddr, sizeof(*trigger_tab), 301 "APEI EINJ Trigger Table"); 302 if (!r) { 303 pr_err("Can not request [mem %#010llx-%#010llx] for Trigger table\n", 304 (unsigned long long)trigger_paddr, 305 (unsigned long long)trigger_paddr + 306 sizeof(*trigger_tab) - 1); 307 goto out; 308 } 309 trigger_tab = ioremap_cache(trigger_paddr, sizeof(*trigger_tab)); 310 if (!trigger_tab) { 311 pr_err("Failed to map trigger table!\n"); 312 goto out_rel_header; 313 } 314 rc = einj_check_trigger_header(trigger_tab); 315 if (rc) { 316 pr_warn(FW_BUG "Invalid trigger error action table.\n"); 317 goto out_rel_header; 318 } 319 320 /* No action structures in the TRIGGER_ERROR table, nothing to do */ 321 if (!trigger_tab->entry_count) 322 goto out_rel_header; 323 324 rc = -EIO; 325 table_size = trigger_tab->table_size; 326 r = request_mem_region(trigger_paddr + sizeof(*trigger_tab), 327 table_size - sizeof(*trigger_tab), 328 "APEI EINJ Trigger Table"); 329 if (!r) { 330 pr_err("Can not request [mem %#010llx-%#010llx] for Trigger Table Entry\n", 331 (unsigned long long)trigger_paddr + sizeof(*trigger_tab), 332 (unsigned long long)trigger_paddr + table_size - 1); 333 goto out_rel_header; 334 } 335 iounmap(trigger_tab); 336 trigger_tab = ioremap_cache(trigger_paddr, table_size); 337 if (!trigger_tab) { 338 pr_err("Failed to map trigger table!\n"); 339 goto out_rel_entry; 340 } 341 trigger_entry = (struct acpi_whea_header *) 342 ((char *)trigger_tab + sizeof(struct acpi_einj_trigger)); 343 apei_resources_init(&trigger_resources); 344 apei_exec_ctx_init(&trigger_ctx, einj_ins_type, 345 ARRAY_SIZE(einj_ins_type), 346 trigger_entry, trigger_tab->entry_count); 347 rc = apei_exec_collect_resources(&trigger_ctx, &trigger_resources); 348 if (rc) 349 goto out_fini; 350 rc = apei_resources_sub(&trigger_resources, &einj_resources); 351 if (rc) 352 goto out_fini; 353 /* 354 * Some firmware will access target address specified in 355 * param1 to trigger the error when injecting memory error. 356 * This will cause resource conflict with regular memory. So 357 * remove it from trigger table resources. 358 */ 359 if ((param_extension || acpi5) && (type & MEM_ERROR_MASK) && param2) { 360 struct apei_resources addr_resources; 361 apei_resources_init(&addr_resources); 362 trigger_param_region = einj_get_trigger_parameter_region( 363 trigger_tab, param1, param2); 364 if (trigger_param_region) { 365 rc = apei_resources_add(&addr_resources, 366 trigger_param_region->address, 367 trigger_param_region->bit_width/8, true); 368 if (rc) 369 goto out_fini; 370 rc = apei_resources_sub(&trigger_resources, 371 &addr_resources); 372 } 373 apei_resources_fini(&addr_resources); 374 if (rc) 375 goto out_fini; 376 } 377 rc = apei_resources_request(&trigger_resources, "APEI EINJ Trigger"); 378 if (rc) 379 goto out_fini; 380 rc = apei_exec_pre_map_gars(&trigger_ctx); 381 if (rc) 382 goto out_release; 383 384 rc = apei_exec_run(&trigger_ctx, ACPI_EINJ_TRIGGER_ERROR); 385 386 apei_exec_post_unmap_gars(&trigger_ctx); 387 out_release: 388 apei_resources_release(&trigger_resources); 389 out_fini: 390 apei_resources_fini(&trigger_resources); 391 out_rel_entry: 392 release_mem_region(trigger_paddr + sizeof(*trigger_tab), 393 table_size - sizeof(*trigger_tab)); 394 out_rel_header: 395 release_mem_region(trigger_paddr, sizeof(*trigger_tab)); 396 out: 397 if (trigger_tab) 398 iounmap(trigger_tab); 399 400 return rc; 401 } 402 403 static int __einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2, 404 u64 param3, u64 param4) 405 { 406 struct apei_exec_context ctx; 407 u64 val, trigger_paddr, timeout = FIRMWARE_TIMEOUT; 408 int rc; 409 410 einj_exec_ctx_init(&ctx); 411 412 rc = apei_exec_run_optional(&ctx, ACPI_EINJ_BEGIN_OPERATION); 413 if (rc) 414 return rc; 415 apei_exec_ctx_set_input(&ctx, type); 416 if (acpi5) { 417 struct set_error_type_with_address *v5param = einj_param; 418 419 v5param->type = type; 420 if (type & ACPI5_VENDOR_BIT) { 421 switch (vendor_flags) { 422 case SETWA_FLAGS_APICID: 423 v5param->apicid = param1; 424 break; 425 case SETWA_FLAGS_MEM: 426 v5param->memory_address = param1; 427 v5param->memory_address_range = param2; 428 break; 429 case SETWA_FLAGS_PCIE_SBDF: 430 v5param->pcie_sbdf = param1; 431 break; 432 } 433 v5param->flags = vendor_flags; 434 } else if (flags) { 435 v5param->flags = flags; 436 v5param->memory_address = param1; 437 v5param->memory_address_range = param2; 438 v5param->apicid = param3; 439 v5param->pcie_sbdf = param4; 440 } else { 441 switch (type) { 442 case ACPI_EINJ_PROCESSOR_CORRECTABLE: 443 case ACPI_EINJ_PROCESSOR_UNCORRECTABLE: 444 case ACPI_EINJ_PROCESSOR_FATAL: 445 v5param->apicid = param1; 446 v5param->flags = SETWA_FLAGS_APICID; 447 break; 448 case ACPI_EINJ_MEMORY_CORRECTABLE: 449 case ACPI_EINJ_MEMORY_UNCORRECTABLE: 450 case ACPI_EINJ_MEMORY_FATAL: 451 v5param->memory_address = param1; 452 v5param->memory_address_range = param2; 453 v5param->flags = SETWA_FLAGS_MEM; 454 break; 455 case ACPI_EINJ_PCIX_CORRECTABLE: 456 case ACPI_EINJ_PCIX_UNCORRECTABLE: 457 case ACPI_EINJ_PCIX_FATAL: 458 v5param->pcie_sbdf = param1; 459 v5param->flags = SETWA_FLAGS_PCIE_SBDF; 460 break; 461 } 462 } 463 } else { 464 rc = apei_exec_run(&ctx, ACPI_EINJ_SET_ERROR_TYPE); 465 if (rc) 466 return rc; 467 if (einj_param) { 468 struct einj_parameter *v4param = einj_param; 469 v4param->param1 = param1; 470 v4param->param2 = param2; 471 } 472 } 473 rc = apei_exec_run(&ctx, ACPI_EINJ_EXECUTE_OPERATION); 474 if (rc) 475 return rc; 476 for (;;) { 477 rc = apei_exec_run(&ctx, ACPI_EINJ_CHECK_BUSY_STATUS); 478 if (rc) 479 return rc; 480 val = apei_exec_ctx_get_output(&ctx); 481 if (!(val & EINJ_OP_BUSY)) 482 break; 483 if (einj_timedout(&timeout)) 484 return -EIO; 485 } 486 rc = apei_exec_run(&ctx, ACPI_EINJ_GET_COMMAND_STATUS); 487 if (rc) 488 return rc; 489 val = apei_exec_ctx_get_output(&ctx); 490 if (val != EINJ_STATUS_SUCCESS) 491 return -EBUSY; 492 493 rc = apei_exec_run(&ctx, ACPI_EINJ_GET_TRIGGER_TABLE); 494 if (rc) 495 return rc; 496 trigger_paddr = apei_exec_ctx_get_output(&ctx); 497 if (notrigger == 0) { 498 rc = __einj_error_trigger(trigger_paddr, type, param1, param2); 499 if (rc) 500 return rc; 501 } 502 rc = apei_exec_run_optional(&ctx, ACPI_EINJ_END_OPERATION); 503 504 return rc; 505 } 506 507 /* Inject the specified hardware error */ 508 static int einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2, 509 u64 param3, u64 param4) 510 { 511 int rc; 512 u64 base_addr, size; 513 514 /* If user manually set "flags", make sure it is legal */ 515 if (flags && (flags & 516 ~(SETWA_FLAGS_APICID|SETWA_FLAGS_MEM|SETWA_FLAGS_PCIE_SBDF))) 517 return -EINVAL; 518 519 /* 520 * We need extra sanity checks for memory errors. 521 * Other types leap directly to injection. 522 */ 523 524 /* ensure param1/param2 existed */ 525 if (!(param_extension || acpi5)) 526 goto inject; 527 528 /* ensure injection is memory related */ 529 if (type & ACPI5_VENDOR_BIT) { 530 if (vendor_flags != SETWA_FLAGS_MEM) 531 goto inject; 532 } else if (!(type & MEM_ERROR_MASK) && !(flags & SETWA_FLAGS_MEM)) 533 goto inject; 534 535 /* 536 * Disallow crazy address masks that give BIOS leeway to pick 537 * injection address almost anywhere. Insist on page or 538 * better granularity and that target address is normal RAM or 539 * NVDIMM. 540 */ 541 base_addr = param1 & param2; 542 size = ~param2 + 1; 543 544 if (((param2 & PAGE_MASK) != PAGE_MASK) || 545 ((region_intersects(base_addr, size, IORESOURCE_SYSTEM_RAM, IORES_DESC_NONE) 546 != REGION_INTERSECTS) && 547 (region_intersects(base_addr, size, IORESOURCE_MEM, IORES_DESC_PERSISTENT_MEMORY) 548 != REGION_INTERSECTS))) 549 return -EINVAL; 550 551 inject: 552 mutex_lock(&einj_mutex); 553 rc = __einj_error_inject(type, flags, param1, param2, param3, param4); 554 mutex_unlock(&einj_mutex); 555 556 return rc; 557 } 558 559 static u32 error_type; 560 static u32 error_flags; 561 static u64 error_param1; 562 static u64 error_param2; 563 static u64 error_param3; 564 static u64 error_param4; 565 static struct dentry *einj_debug_dir; 566 567 static int available_error_type_show(struct seq_file *m, void *v) 568 { 569 int rc; 570 u32 available_error_type = 0; 571 572 rc = einj_get_available_error_type(&available_error_type); 573 if (rc) 574 return rc; 575 if (available_error_type & 0x0001) 576 seq_printf(m, "0x00000001\tProcessor Correctable\n"); 577 if (available_error_type & 0x0002) 578 seq_printf(m, "0x00000002\tProcessor Uncorrectable non-fatal\n"); 579 if (available_error_type & 0x0004) 580 seq_printf(m, "0x00000004\tProcessor Uncorrectable fatal\n"); 581 if (available_error_type & 0x0008) 582 seq_printf(m, "0x00000008\tMemory Correctable\n"); 583 if (available_error_type & 0x0010) 584 seq_printf(m, "0x00000010\tMemory Uncorrectable non-fatal\n"); 585 if (available_error_type & 0x0020) 586 seq_printf(m, "0x00000020\tMemory Uncorrectable fatal\n"); 587 if (available_error_type & 0x0040) 588 seq_printf(m, "0x00000040\tPCI Express Correctable\n"); 589 if (available_error_type & 0x0080) 590 seq_printf(m, "0x00000080\tPCI Express Uncorrectable non-fatal\n"); 591 if (available_error_type & 0x0100) 592 seq_printf(m, "0x00000100\tPCI Express Uncorrectable fatal\n"); 593 if (available_error_type & 0x0200) 594 seq_printf(m, "0x00000200\tPlatform Correctable\n"); 595 if (available_error_type & 0x0400) 596 seq_printf(m, "0x00000400\tPlatform Uncorrectable non-fatal\n"); 597 if (available_error_type & 0x0800) 598 seq_printf(m, "0x00000800\tPlatform Uncorrectable fatal\n"); 599 600 return 0; 601 } 602 603 DEFINE_SHOW_ATTRIBUTE(available_error_type); 604 605 static int error_type_get(void *data, u64 *val) 606 { 607 *val = error_type; 608 609 return 0; 610 } 611 612 static int error_type_set(void *data, u64 val) 613 { 614 int rc; 615 u32 available_error_type = 0; 616 u32 tval, vendor; 617 618 /* 619 * Vendor defined types have 0x80000000 bit set, and 620 * are not enumerated by ACPI_EINJ_GET_ERROR_TYPE 621 */ 622 vendor = val & ACPI5_VENDOR_BIT; 623 tval = val & 0x7fffffff; 624 625 /* Only one error type can be specified */ 626 if (tval & (tval - 1)) 627 return -EINVAL; 628 if (!vendor) { 629 rc = einj_get_available_error_type(&available_error_type); 630 if (rc) 631 return rc; 632 if (!(val & available_error_type)) 633 return -EINVAL; 634 } 635 error_type = val; 636 637 return 0; 638 } 639 640 DEFINE_DEBUGFS_ATTRIBUTE(error_type_fops, error_type_get, error_type_set, 641 "0x%llx\n"); 642 643 static int error_inject_set(void *data, u64 val) 644 { 645 if (!error_type) 646 return -EINVAL; 647 648 return einj_error_inject(error_type, error_flags, error_param1, error_param2, 649 error_param3, error_param4); 650 } 651 652 DEFINE_DEBUGFS_ATTRIBUTE(error_inject_fops, NULL, error_inject_set, "%llu\n"); 653 654 static int einj_check_table(struct acpi_table_einj *einj_tab) 655 { 656 if ((einj_tab->header_length != 657 (sizeof(struct acpi_table_einj) - sizeof(einj_tab->header))) 658 && (einj_tab->header_length != sizeof(struct acpi_table_einj))) 659 return -EINVAL; 660 if (einj_tab->header.length < sizeof(struct acpi_table_einj)) 661 return -EINVAL; 662 if (einj_tab->entries != 663 (einj_tab->header.length - sizeof(struct acpi_table_einj)) / 664 sizeof(struct acpi_einj_entry)) 665 return -EINVAL; 666 667 return 0; 668 } 669 670 static int __init einj_init(void) 671 { 672 int rc; 673 acpi_status status; 674 struct apei_exec_context ctx; 675 676 if (acpi_disabled) { 677 pr_info("ACPI disabled.\n"); 678 return -ENODEV; 679 } 680 681 status = acpi_get_table(ACPI_SIG_EINJ, 0, 682 (struct acpi_table_header **)&einj_tab); 683 if (status == AE_NOT_FOUND) { 684 pr_warn("EINJ table not found.\n"); 685 return -ENODEV; 686 } 687 else if (ACPI_FAILURE(status)) { 688 pr_err("Failed to get EINJ table: %s\n", 689 acpi_format_exception(status)); 690 return -EINVAL; 691 } 692 693 rc = einj_check_table(einj_tab); 694 if (rc) { 695 pr_warn(FW_BUG "Invalid EINJ table.\n"); 696 goto err_put_table; 697 } 698 699 rc = -ENOMEM; 700 einj_debug_dir = debugfs_create_dir("einj", apei_get_debugfs_dir()); 701 702 debugfs_create_file("available_error_type", S_IRUSR, einj_debug_dir, 703 NULL, &available_error_type_fops); 704 debugfs_create_file_unsafe("error_type", 0600, einj_debug_dir, 705 NULL, &error_type_fops); 706 debugfs_create_file_unsafe("error_inject", 0200, einj_debug_dir, 707 NULL, &error_inject_fops); 708 709 apei_resources_init(&einj_resources); 710 einj_exec_ctx_init(&ctx); 711 rc = apei_exec_collect_resources(&ctx, &einj_resources); 712 if (rc) { 713 pr_err("Error collecting EINJ resources.\n"); 714 goto err_fini; 715 } 716 717 rc = apei_resources_request(&einj_resources, "APEI EINJ"); 718 if (rc) { 719 pr_err("Error requesting memory/port resources.\n"); 720 goto err_fini; 721 } 722 723 rc = apei_exec_pre_map_gars(&ctx); 724 if (rc) { 725 pr_err("Error pre-mapping GARs.\n"); 726 goto err_release; 727 } 728 729 einj_param = einj_get_parameter_address(); 730 if ((param_extension || acpi5) && einj_param) { 731 debugfs_create_x32("flags", S_IRUSR | S_IWUSR, einj_debug_dir, 732 &error_flags); 733 debugfs_create_x64("param1", S_IRUSR | S_IWUSR, einj_debug_dir, 734 &error_param1); 735 debugfs_create_x64("param2", S_IRUSR | S_IWUSR, einj_debug_dir, 736 &error_param2); 737 debugfs_create_x64("param3", S_IRUSR | S_IWUSR, einj_debug_dir, 738 &error_param3); 739 debugfs_create_x64("param4", S_IRUSR | S_IWUSR, einj_debug_dir, 740 &error_param4); 741 debugfs_create_x32("notrigger", S_IRUSR | S_IWUSR, 742 einj_debug_dir, ¬rigger); 743 } 744 745 if (vendor_dev[0]) { 746 vendor_blob.data = vendor_dev; 747 vendor_blob.size = strlen(vendor_dev); 748 debugfs_create_blob("vendor", S_IRUSR, einj_debug_dir, 749 &vendor_blob); 750 debugfs_create_x32("vendor_flags", S_IRUSR | S_IWUSR, 751 einj_debug_dir, &vendor_flags); 752 } 753 754 pr_info("Error INJection is initialized.\n"); 755 756 return 0; 757 758 err_release: 759 apei_resources_release(&einj_resources); 760 err_fini: 761 apei_resources_fini(&einj_resources); 762 debugfs_remove_recursive(einj_debug_dir); 763 err_put_table: 764 acpi_put_table((struct acpi_table_header *)einj_tab); 765 766 return rc; 767 } 768 769 static void __exit einj_exit(void) 770 { 771 struct apei_exec_context ctx; 772 773 if (einj_param) { 774 acpi_size size = (acpi5) ? 775 sizeof(struct set_error_type_with_address) : 776 sizeof(struct einj_parameter); 777 778 acpi_os_unmap_iomem(einj_param, size); 779 } 780 einj_exec_ctx_init(&ctx); 781 apei_exec_post_unmap_gars(&ctx); 782 apei_resources_release(&einj_resources); 783 apei_resources_fini(&einj_resources); 784 debugfs_remove_recursive(einj_debug_dir); 785 acpi_put_table((struct acpi_table_header *)einj_tab); 786 } 787 788 module_init(einj_init); 789 module_exit(einj_exit); 790 791 MODULE_AUTHOR("Huang Ying"); 792 MODULE_DESCRIPTION("APEI Error INJection support"); 793 MODULE_LICENSE("GPL"); 794