1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * APEI Error INJection support 4 * 5 * EINJ provides a hardware error injection mechanism, this is useful 6 * for debugging and testing of other APEI and RAS features. 7 * 8 * For more information about EINJ, please refer to ACPI Specification 9 * version 4.0, section 17.5. 10 * 11 * Copyright 2009-2010 Intel Corp. 12 * Author: Huang Ying <ying.huang@intel.com> 13 */ 14 15 #include <linux/kernel.h> 16 #include <linux/module.h> 17 #include <linux/init.h> 18 #include <linux/io.h> 19 #include <linux/debugfs.h> 20 #include <linux/seq_file.h> 21 #include <linux/nmi.h> 22 #include <linux/delay.h> 23 #include <linux/mm.h> 24 #include <asm/unaligned.h> 25 26 #include "apei-internal.h" 27 28 #undef pr_fmt 29 #define pr_fmt(fmt) "EINJ: " fmt 30 31 #define SLEEP_UNIT_MIN 1000 /* 1ms */ 32 #define SLEEP_UNIT_MAX 5000 /* 5ms */ 33 /* Firmware should respond within 1 seconds */ 34 #define FIRMWARE_TIMEOUT (1 * USEC_PER_SEC) 35 #define ACPI5_VENDOR_BIT BIT(31) 36 #define MEM_ERROR_MASK (ACPI_EINJ_MEMORY_CORRECTABLE | \ 37 ACPI_EINJ_MEMORY_UNCORRECTABLE | \ 38 ACPI_EINJ_MEMORY_FATAL) 39 40 /* 41 * ACPI version 5 provides a SET_ERROR_TYPE_WITH_ADDRESS action. 42 */ 43 static int acpi5; 44 45 struct set_error_type_with_address { 46 u32 type; 47 u32 vendor_extension; 48 u32 flags; 49 u32 apicid; 50 u64 memory_address; 51 u64 memory_address_range; 52 u32 pcie_sbdf; 53 }; 54 enum { 55 SETWA_FLAGS_APICID = 1, 56 SETWA_FLAGS_MEM = 2, 57 SETWA_FLAGS_PCIE_SBDF = 4, 58 }; 59 60 /* 61 * Vendor extensions for platform specific operations 62 */ 63 struct vendor_error_type_extension { 64 u32 length; 65 u32 pcie_sbdf; 66 u16 vendor_id; 67 u16 device_id; 68 u8 rev_id; 69 u8 reserved[3]; 70 }; 71 72 static u32 notrigger; 73 74 static u32 vendor_flags; 75 static struct debugfs_blob_wrapper vendor_blob; 76 static char vendor_dev[64]; 77 78 /* 79 * Some BIOSes allow parameters to the SET_ERROR_TYPE entries in the 80 * EINJ table through an unpublished extension. Use with caution as 81 * most will ignore the parameter and make their own choice of address 82 * for error injection. This extension is used only if 83 * param_extension module parameter is specified. 84 */ 85 struct einj_parameter { 86 u64 type; 87 u64 reserved1; 88 u64 reserved2; 89 u64 param1; 90 u64 param2; 91 }; 92 93 #define EINJ_OP_BUSY 0x1 94 #define EINJ_STATUS_SUCCESS 0x0 95 #define EINJ_STATUS_FAIL 0x1 96 #define EINJ_STATUS_INVAL 0x2 97 98 #define EINJ_TAB_ENTRY(tab) \ 99 ((struct acpi_whea_header *)((char *)(tab) + \ 100 sizeof(struct acpi_table_einj))) 101 102 static bool param_extension; 103 module_param(param_extension, bool, 0); 104 105 static struct acpi_table_einj *einj_tab; 106 107 static struct apei_resources einj_resources; 108 109 static struct apei_exec_ins_type einj_ins_type[] = { 110 [ACPI_EINJ_READ_REGISTER] = { 111 .flags = APEI_EXEC_INS_ACCESS_REGISTER, 112 .run = apei_exec_read_register, 113 }, 114 [ACPI_EINJ_READ_REGISTER_VALUE] = { 115 .flags = APEI_EXEC_INS_ACCESS_REGISTER, 116 .run = apei_exec_read_register_value, 117 }, 118 [ACPI_EINJ_WRITE_REGISTER] = { 119 .flags = APEI_EXEC_INS_ACCESS_REGISTER, 120 .run = apei_exec_write_register, 121 }, 122 [ACPI_EINJ_WRITE_REGISTER_VALUE] = { 123 .flags = APEI_EXEC_INS_ACCESS_REGISTER, 124 .run = apei_exec_write_register_value, 125 }, 126 [ACPI_EINJ_NOOP] = { 127 .flags = 0, 128 .run = apei_exec_noop, 129 }, 130 }; 131 132 /* 133 * Prevent EINJ interpreter to run simultaneously, because the 134 * corresponding firmware implementation may not work properly when 135 * invoked simultaneously. 136 */ 137 static DEFINE_MUTEX(einj_mutex); 138 139 static void *einj_param; 140 141 static void einj_exec_ctx_init(struct apei_exec_context *ctx) 142 { 143 apei_exec_ctx_init(ctx, einj_ins_type, ARRAY_SIZE(einj_ins_type), 144 EINJ_TAB_ENTRY(einj_tab), einj_tab->entries); 145 } 146 147 static int __einj_get_available_error_type(u32 *type) 148 { 149 struct apei_exec_context ctx; 150 int rc; 151 152 einj_exec_ctx_init(&ctx); 153 rc = apei_exec_run(&ctx, ACPI_EINJ_GET_ERROR_TYPE); 154 if (rc) 155 return rc; 156 *type = apei_exec_ctx_get_output(&ctx); 157 158 return 0; 159 } 160 161 /* Get error injection capabilities of the platform */ 162 static int einj_get_available_error_type(u32 *type) 163 { 164 int rc; 165 166 mutex_lock(&einj_mutex); 167 rc = __einj_get_available_error_type(type); 168 mutex_unlock(&einj_mutex); 169 170 return rc; 171 } 172 173 static int einj_timedout(u64 *t) 174 { 175 if ((s64)*t < SLEEP_UNIT_MIN) { 176 pr_warn(FW_WARN "Firmware does not respond in time\n"); 177 return 1; 178 } 179 *t -= SLEEP_UNIT_MIN; 180 usleep_range(SLEEP_UNIT_MIN, SLEEP_UNIT_MAX); 181 182 return 0; 183 } 184 185 static void check_vendor_extension(u64 paddr, 186 struct set_error_type_with_address *v5param) 187 { 188 int offset = v5param->vendor_extension; 189 struct vendor_error_type_extension *v; 190 u32 sbdf; 191 192 if (!offset) 193 return; 194 v = acpi_os_map_iomem(paddr + offset, sizeof(*v)); 195 if (!v) 196 return; 197 sbdf = v->pcie_sbdf; 198 sprintf(vendor_dev, "%x:%x:%x.%x vendor_id=%x device_id=%x rev_id=%x\n", 199 sbdf >> 24, (sbdf >> 16) & 0xff, 200 (sbdf >> 11) & 0x1f, (sbdf >> 8) & 0x7, 201 v->vendor_id, v->device_id, v->rev_id); 202 acpi_os_unmap_iomem(v, sizeof(*v)); 203 } 204 205 static void *einj_get_parameter_address(void) 206 { 207 int i; 208 u64 pa_v4 = 0, pa_v5 = 0; 209 struct acpi_whea_header *entry; 210 211 entry = EINJ_TAB_ENTRY(einj_tab); 212 for (i = 0; i < einj_tab->entries; i++) { 213 if (entry->action == ACPI_EINJ_SET_ERROR_TYPE && 214 entry->instruction == ACPI_EINJ_WRITE_REGISTER && 215 entry->register_region.space_id == 216 ACPI_ADR_SPACE_SYSTEM_MEMORY) 217 pa_v4 = get_unaligned(&entry->register_region.address); 218 if (entry->action == ACPI_EINJ_SET_ERROR_TYPE_WITH_ADDRESS && 219 entry->instruction == ACPI_EINJ_WRITE_REGISTER && 220 entry->register_region.space_id == 221 ACPI_ADR_SPACE_SYSTEM_MEMORY) 222 pa_v5 = get_unaligned(&entry->register_region.address); 223 entry++; 224 } 225 if (pa_v5) { 226 struct set_error_type_with_address *v5param; 227 228 v5param = acpi_os_map_iomem(pa_v5, sizeof(*v5param)); 229 if (v5param) { 230 acpi5 = 1; 231 check_vendor_extension(pa_v5, v5param); 232 return v5param; 233 } 234 } 235 if (param_extension && pa_v4) { 236 struct einj_parameter *v4param; 237 238 v4param = acpi_os_map_iomem(pa_v4, sizeof(*v4param)); 239 if (!v4param) 240 return NULL; 241 if (v4param->reserved1 || v4param->reserved2) { 242 acpi_os_unmap_iomem(v4param, sizeof(*v4param)); 243 return NULL; 244 } 245 return v4param; 246 } 247 248 return NULL; 249 } 250 251 /* do sanity check to trigger table */ 252 static int einj_check_trigger_header(struct acpi_einj_trigger *trigger_tab) 253 { 254 if (trigger_tab->header_size != sizeof(struct acpi_einj_trigger)) 255 return -EINVAL; 256 if (trigger_tab->table_size > PAGE_SIZE || 257 trigger_tab->table_size < trigger_tab->header_size) 258 return -EINVAL; 259 if (trigger_tab->entry_count != 260 (trigger_tab->table_size - trigger_tab->header_size) / 261 sizeof(struct acpi_einj_entry)) 262 return -EINVAL; 263 264 return 0; 265 } 266 267 static struct acpi_generic_address *einj_get_trigger_parameter_region( 268 struct acpi_einj_trigger *trigger_tab, u64 param1, u64 param2) 269 { 270 int i; 271 struct acpi_whea_header *entry; 272 273 entry = (struct acpi_whea_header *) 274 ((char *)trigger_tab + sizeof(struct acpi_einj_trigger)); 275 for (i = 0; i < trigger_tab->entry_count; i++) { 276 if (entry->action == ACPI_EINJ_TRIGGER_ERROR && 277 entry->instruction <= ACPI_EINJ_WRITE_REGISTER_VALUE && 278 entry->register_region.space_id == 279 ACPI_ADR_SPACE_SYSTEM_MEMORY && 280 (entry->register_region.address & param2) == (param1 & param2)) 281 return &entry->register_region; 282 entry++; 283 } 284 285 return NULL; 286 } 287 /* Execute instructions in trigger error action table */ 288 static int __einj_error_trigger(u64 trigger_paddr, u32 type, 289 u64 param1, u64 param2) 290 { 291 struct acpi_einj_trigger *trigger_tab = NULL; 292 struct apei_exec_context trigger_ctx; 293 struct apei_resources trigger_resources; 294 struct acpi_whea_header *trigger_entry; 295 struct resource *r; 296 u32 table_size; 297 int rc = -EIO; 298 struct acpi_generic_address *trigger_param_region = NULL; 299 300 r = request_mem_region(trigger_paddr, sizeof(*trigger_tab), 301 "APEI EINJ Trigger Table"); 302 if (!r) { 303 pr_err("Can not request [mem %#010llx-%#010llx] for Trigger table\n", 304 (unsigned long long)trigger_paddr, 305 (unsigned long long)trigger_paddr + 306 sizeof(*trigger_tab) - 1); 307 goto out; 308 } 309 trigger_tab = ioremap_cache(trigger_paddr, sizeof(*trigger_tab)); 310 if (!trigger_tab) { 311 pr_err("Failed to map trigger table!\n"); 312 goto out_rel_header; 313 } 314 rc = einj_check_trigger_header(trigger_tab); 315 if (rc) { 316 pr_warn(FW_BUG "Invalid trigger error action table.\n"); 317 goto out_rel_header; 318 } 319 320 /* No action structures in the TRIGGER_ERROR table, nothing to do */ 321 if (!trigger_tab->entry_count) 322 goto out_rel_header; 323 324 rc = -EIO; 325 table_size = trigger_tab->table_size; 326 r = request_mem_region(trigger_paddr + sizeof(*trigger_tab), 327 table_size - sizeof(*trigger_tab), 328 "APEI EINJ Trigger Table"); 329 if (!r) { 330 pr_err("Can not request [mem %#010llx-%#010llx] for Trigger Table Entry\n", 331 (unsigned long long)trigger_paddr + sizeof(*trigger_tab), 332 (unsigned long long)trigger_paddr + table_size - 1); 333 goto out_rel_header; 334 } 335 iounmap(trigger_tab); 336 trigger_tab = ioremap_cache(trigger_paddr, table_size); 337 if (!trigger_tab) { 338 pr_err("Failed to map trigger table!\n"); 339 goto out_rel_entry; 340 } 341 trigger_entry = (struct acpi_whea_header *) 342 ((char *)trigger_tab + sizeof(struct acpi_einj_trigger)); 343 apei_resources_init(&trigger_resources); 344 apei_exec_ctx_init(&trigger_ctx, einj_ins_type, 345 ARRAY_SIZE(einj_ins_type), 346 trigger_entry, trigger_tab->entry_count); 347 rc = apei_exec_collect_resources(&trigger_ctx, &trigger_resources); 348 if (rc) 349 goto out_fini; 350 rc = apei_resources_sub(&trigger_resources, &einj_resources); 351 if (rc) 352 goto out_fini; 353 /* 354 * Some firmware will access target address specified in 355 * param1 to trigger the error when injecting memory error. 356 * This will cause resource conflict with regular memory. So 357 * remove it from trigger table resources. 358 */ 359 if ((param_extension || acpi5) && (type & MEM_ERROR_MASK) && param2) { 360 struct apei_resources addr_resources; 361 362 apei_resources_init(&addr_resources); 363 trigger_param_region = einj_get_trigger_parameter_region( 364 trigger_tab, param1, param2); 365 if (trigger_param_region) { 366 rc = apei_resources_add(&addr_resources, 367 trigger_param_region->address, 368 trigger_param_region->bit_width/8, true); 369 if (rc) 370 goto out_fini; 371 rc = apei_resources_sub(&trigger_resources, 372 &addr_resources); 373 } 374 apei_resources_fini(&addr_resources); 375 if (rc) 376 goto out_fini; 377 } 378 rc = apei_resources_request(&trigger_resources, "APEI EINJ Trigger"); 379 if (rc) 380 goto out_fini; 381 rc = apei_exec_pre_map_gars(&trigger_ctx); 382 if (rc) 383 goto out_release; 384 385 rc = apei_exec_run(&trigger_ctx, ACPI_EINJ_TRIGGER_ERROR); 386 387 apei_exec_post_unmap_gars(&trigger_ctx); 388 out_release: 389 apei_resources_release(&trigger_resources); 390 out_fini: 391 apei_resources_fini(&trigger_resources); 392 out_rel_entry: 393 release_mem_region(trigger_paddr + sizeof(*trigger_tab), 394 table_size - sizeof(*trigger_tab)); 395 out_rel_header: 396 release_mem_region(trigger_paddr, sizeof(*trigger_tab)); 397 out: 398 if (trigger_tab) 399 iounmap(trigger_tab); 400 401 return rc; 402 } 403 404 static int __einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2, 405 u64 param3, u64 param4) 406 { 407 struct apei_exec_context ctx; 408 u64 val, trigger_paddr, timeout = FIRMWARE_TIMEOUT; 409 int rc; 410 411 einj_exec_ctx_init(&ctx); 412 413 rc = apei_exec_run_optional(&ctx, ACPI_EINJ_BEGIN_OPERATION); 414 if (rc) 415 return rc; 416 apei_exec_ctx_set_input(&ctx, type); 417 if (acpi5) { 418 struct set_error_type_with_address *v5param = einj_param; 419 420 v5param->type = type; 421 if (type & ACPI5_VENDOR_BIT) { 422 switch (vendor_flags) { 423 case SETWA_FLAGS_APICID: 424 v5param->apicid = param1; 425 break; 426 case SETWA_FLAGS_MEM: 427 v5param->memory_address = param1; 428 v5param->memory_address_range = param2; 429 break; 430 case SETWA_FLAGS_PCIE_SBDF: 431 v5param->pcie_sbdf = param1; 432 break; 433 } 434 v5param->flags = vendor_flags; 435 } else if (flags) { 436 v5param->flags = flags; 437 v5param->memory_address = param1; 438 v5param->memory_address_range = param2; 439 v5param->apicid = param3; 440 v5param->pcie_sbdf = param4; 441 } else { 442 switch (type) { 443 case ACPI_EINJ_PROCESSOR_CORRECTABLE: 444 case ACPI_EINJ_PROCESSOR_UNCORRECTABLE: 445 case ACPI_EINJ_PROCESSOR_FATAL: 446 v5param->apicid = param1; 447 v5param->flags = SETWA_FLAGS_APICID; 448 break; 449 case ACPI_EINJ_MEMORY_CORRECTABLE: 450 case ACPI_EINJ_MEMORY_UNCORRECTABLE: 451 case ACPI_EINJ_MEMORY_FATAL: 452 v5param->memory_address = param1; 453 v5param->memory_address_range = param2; 454 v5param->flags = SETWA_FLAGS_MEM; 455 break; 456 case ACPI_EINJ_PCIX_CORRECTABLE: 457 case ACPI_EINJ_PCIX_UNCORRECTABLE: 458 case ACPI_EINJ_PCIX_FATAL: 459 v5param->pcie_sbdf = param1; 460 v5param->flags = SETWA_FLAGS_PCIE_SBDF; 461 break; 462 } 463 } 464 } else { 465 rc = apei_exec_run(&ctx, ACPI_EINJ_SET_ERROR_TYPE); 466 if (rc) 467 return rc; 468 if (einj_param) { 469 struct einj_parameter *v4param = einj_param; 470 471 v4param->param1 = param1; 472 v4param->param2 = param2; 473 } 474 } 475 rc = apei_exec_run(&ctx, ACPI_EINJ_EXECUTE_OPERATION); 476 if (rc) 477 return rc; 478 for (;;) { 479 rc = apei_exec_run(&ctx, ACPI_EINJ_CHECK_BUSY_STATUS); 480 if (rc) 481 return rc; 482 val = apei_exec_ctx_get_output(&ctx); 483 if (!(val & EINJ_OP_BUSY)) 484 break; 485 if (einj_timedout(&timeout)) 486 return -EIO; 487 } 488 rc = apei_exec_run(&ctx, ACPI_EINJ_GET_COMMAND_STATUS); 489 if (rc) 490 return rc; 491 val = apei_exec_ctx_get_output(&ctx); 492 if (val == EINJ_STATUS_FAIL) 493 return -EBUSY; 494 else if (val == EINJ_STATUS_INVAL) 495 return -EINVAL; 496 497 /* 498 * The error is injected into the platform successfully, then it needs 499 * to trigger the error. 500 */ 501 rc = apei_exec_run(&ctx, ACPI_EINJ_GET_TRIGGER_TABLE); 502 if (rc) 503 return rc; 504 trigger_paddr = apei_exec_ctx_get_output(&ctx); 505 if (notrigger == 0) { 506 rc = __einj_error_trigger(trigger_paddr, type, param1, param2); 507 if (rc) 508 return rc; 509 } 510 rc = apei_exec_run_optional(&ctx, ACPI_EINJ_END_OPERATION); 511 512 return rc; 513 } 514 515 /* Inject the specified hardware error */ 516 static int einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2, 517 u64 param3, u64 param4) 518 { 519 int rc; 520 u64 base_addr, size; 521 522 /* If user manually set "flags", make sure it is legal */ 523 if (flags && (flags & 524 ~(SETWA_FLAGS_APICID|SETWA_FLAGS_MEM|SETWA_FLAGS_PCIE_SBDF))) 525 return -EINVAL; 526 527 /* 528 * We need extra sanity checks for memory errors. 529 * Other types leap directly to injection. 530 */ 531 532 /* ensure param1/param2 existed */ 533 if (!(param_extension || acpi5)) 534 goto inject; 535 536 /* ensure injection is memory related */ 537 if (type & ACPI5_VENDOR_BIT) { 538 if (vendor_flags != SETWA_FLAGS_MEM) 539 goto inject; 540 } else if (!(type & MEM_ERROR_MASK) && !(flags & SETWA_FLAGS_MEM)) 541 goto inject; 542 543 /* 544 * Disallow crazy address masks that give BIOS leeway to pick 545 * injection address almost anywhere. Insist on page or 546 * better granularity and that target address is normal RAM or 547 * NVDIMM. 548 */ 549 base_addr = param1 & param2; 550 size = ~param2 + 1; 551 552 if (((param2 & PAGE_MASK) != PAGE_MASK) || 553 ((region_intersects(base_addr, size, IORESOURCE_SYSTEM_RAM, IORES_DESC_NONE) 554 != REGION_INTERSECTS) && 555 (region_intersects(base_addr, size, IORESOURCE_MEM, IORES_DESC_PERSISTENT_MEMORY) 556 != REGION_INTERSECTS) && 557 (region_intersects(base_addr, size, IORESOURCE_MEM, IORES_DESC_SOFT_RESERVED) 558 != REGION_INTERSECTS) && 559 !arch_is_platform_page(base_addr))) 560 return -EINVAL; 561 562 if (is_zero_pfn(base_addr >> PAGE_SHIFT)) 563 return -EADDRINUSE; 564 565 inject: 566 mutex_lock(&einj_mutex); 567 rc = __einj_error_inject(type, flags, param1, param2, param3, param4); 568 mutex_unlock(&einj_mutex); 569 570 return rc; 571 } 572 573 static u32 error_type; 574 static u32 error_flags; 575 static u64 error_param1; 576 static u64 error_param2; 577 static u64 error_param3; 578 static u64 error_param4; 579 static struct dentry *einj_debug_dir; 580 static const char * const einj_error_type_string[] = { 581 "0x00000001\tProcessor Correctable\n", 582 "0x00000002\tProcessor Uncorrectable non-fatal\n", 583 "0x00000004\tProcessor Uncorrectable fatal\n", 584 "0x00000008\tMemory Correctable\n", 585 "0x00000010\tMemory Uncorrectable non-fatal\n", 586 "0x00000020\tMemory Uncorrectable fatal\n", 587 "0x00000040\tPCI Express Correctable\n", 588 "0x00000080\tPCI Express Uncorrectable non-fatal\n", 589 "0x00000100\tPCI Express Uncorrectable fatal\n", 590 "0x00000200\tPlatform Correctable\n", 591 "0x00000400\tPlatform Uncorrectable non-fatal\n", 592 "0x00000800\tPlatform Uncorrectable fatal\n", 593 "0x00001000\tCXL.cache Protocol Correctable\n", 594 "0x00002000\tCXL.cache Protocol Uncorrectable non-fatal\n", 595 "0x00004000\tCXL.cache Protocol Uncorrectable fatal\n", 596 "0x00008000\tCXL.mem Protocol Correctable\n", 597 "0x00010000\tCXL.mem Protocol Uncorrectable non-fatal\n", 598 "0x00020000\tCXL.mem Protocol Uncorrectable fatal\n", 599 }; 600 601 static int available_error_type_show(struct seq_file *m, void *v) 602 { 603 int rc; 604 u32 available_error_type = 0; 605 606 rc = einj_get_available_error_type(&available_error_type); 607 if (rc) 608 return rc; 609 for (int pos = 0; pos < ARRAY_SIZE(einj_error_type_string); pos++) 610 if (available_error_type & BIT(pos)) 611 seq_puts(m, einj_error_type_string[pos]); 612 613 return 0; 614 } 615 616 DEFINE_SHOW_ATTRIBUTE(available_error_type); 617 618 static int error_type_get(void *data, u64 *val) 619 { 620 *val = error_type; 621 622 return 0; 623 } 624 625 static int error_type_set(void *data, u64 val) 626 { 627 int rc; 628 u32 available_error_type = 0; 629 u32 tval, vendor; 630 631 /* Only low 32 bits for error type are valid */ 632 if (val & GENMASK_ULL(63, 32)) 633 return -EINVAL; 634 635 /* 636 * Vendor defined types have 0x80000000 bit set, and 637 * are not enumerated by ACPI_EINJ_GET_ERROR_TYPE 638 */ 639 vendor = val & ACPI5_VENDOR_BIT; 640 tval = val & 0x7fffffff; 641 642 /* Only one error type can be specified */ 643 if (tval & (tval - 1)) 644 return -EINVAL; 645 if (!vendor) { 646 rc = einj_get_available_error_type(&available_error_type); 647 if (rc) 648 return rc; 649 if (!(val & available_error_type)) 650 return -EINVAL; 651 } 652 error_type = val; 653 654 return 0; 655 } 656 657 DEFINE_DEBUGFS_ATTRIBUTE(error_type_fops, error_type_get, error_type_set, 658 "0x%llx\n"); 659 660 static int error_inject_set(void *data, u64 val) 661 { 662 if (!error_type) 663 return -EINVAL; 664 665 return einj_error_inject(error_type, error_flags, error_param1, error_param2, 666 error_param3, error_param4); 667 } 668 669 DEFINE_DEBUGFS_ATTRIBUTE(error_inject_fops, NULL, error_inject_set, "%llu\n"); 670 671 static int einj_check_table(struct acpi_table_einj *einj_tab) 672 { 673 if ((einj_tab->header_length != 674 (sizeof(struct acpi_table_einj) - sizeof(einj_tab->header))) 675 && (einj_tab->header_length != sizeof(struct acpi_table_einj))) 676 return -EINVAL; 677 if (einj_tab->header.length < sizeof(struct acpi_table_einj)) 678 return -EINVAL; 679 if (einj_tab->entries != 680 (einj_tab->header.length - sizeof(struct acpi_table_einj)) / 681 sizeof(struct acpi_einj_entry)) 682 return -EINVAL; 683 684 return 0; 685 } 686 687 static int __init einj_init(void) 688 { 689 int rc; 690 acpi_status status; 691 struct apei_exec_context ctx; 692 693 if (acpi_disabled) { 694 pr_info("ACPI disabled.\n"); 695 return -ENODEV; 696 } 697 698 status = acpi_get_table(ACPI_SIG_EINJ, 0, 699 (struct acpi_table_header **)&einj_tab); 700 if (status == AE_NOT_FOUND) { 701 pr_warn("EINJ table not found.\n"); 702 return -ENODEV; 703 } else if (ACPI_FAILURE(status)) { 704 pr_err("Failed to get EINJ table: %s\n", 705 acpi_format_exception(status)); 706 return -EINVAL; 707 } 708 709 rc = einj_check_table(einj_tab); 710 if (rc) { 711 pr_warn(FW_BUG "Invalid EINJ table.\n"); 712 goto err_put_table; 713 } 714 715 rc = -ENOMEM; 716 einj_debug_dir = debugfs_create_dir("einj", apei_get_debugfs_dir()); 717 718 debugfs_create_file("available_error_type", S_IRUSR, einj_debug_dir, 719 NULL, &available_error_type_fops); 720 debugfs_create_file_unsafe("error_type", 0600, einj_debug_dir, 721 NULL, &error_type_fops); 722 debugfs_create_file_unsafe("error_inject", 0200, einj_debug_dir, 723 NULL, &error_inject_fops); 724 725 apei_resources_init(&einj_resources); 726 einj_exec_ctx_init(&ctx); 727 rc = apei_exec_collect_resources(&ctx, &einj_resources); 728 if (rc) { 729 pr_err("Error collecting EINJ resources.\n"); 730 goto err_fini; 731 } 732 733 rc = apei_resources_request(&einj_resources, "APEI EINJ"); 734 if (rc) { 735 pr_err("Error requesting memory/port resources.\n"); 736 goto err_fini; 737 } 738 739 rc = apei_exec_pre_map_gars(&ctx); 740 if (rc) { 741 pr_err("Error pre-mapping GARs.\n"); 742 goto err_release; 743 } 744 745 einj_param = einj_get_parameter_address(); 746 if ((param_extension || acpi5) && einj_param) { 747 debugfs_create_x32("flags", S_IRUSR | S_IWUSR, einj_debug_dir, 748 &error_flags); 749 debugfs_create_x64("param1", S_IRUSR | S_IWUSR, einj_debug_dir, 750 &error_param1); 751 debugfs_create_x64("param2", S_IRUSR | S_IWUSR, einj_debug_dir, 752 &error_param2); 753 debugfs_create_x64("param3", S_IRUSR | S_IWUSR, einj_debug_dir, 754 &error_param3); 755 debugfs_create_x64("param4", S_IRUSR | S_IWUSR, einj_debug_dir, 756 &error_param4); 757 debugfs_create_x32("notrigger", S_IRUSR | S_IWUSR, 758 einj_debug_dir, ¬rigger); 759 } 760 761 if (vendor_dev[0]) { 762 vendor_blob.data = vendor_dev; 763 vendor_blob.size = strlen(vendor_dev); 764 debugfs_create_blob("vendor", S_IRUSR, einj_debug_dir, 765 &vendor_blob); 766 debugfs_create_x32("vendor_flags", S_IRUSR | S_IWUSR, 767 einj_debug_dir, &vendor_flags); 768 } 769 770 pr_info("Error INJection is initialized.\n"); 771 772 return 0; 773 774 err_release: 775 apei_resources_release(&einj_resources); 776 err_fini: 777 apei_resources_fini(&einj_resources); 778 debugfs_remove_recursive(einj_debug_dir); 779 err_put_table: 780 acpi_put_table((struct acpi_table_header *)einj_tab); 781 782 return rc; 783 } 784 785 static void __exit einj_exit(void) 786 { 787 struct apei_exec_context ctx; 788 789 if (einj_param) { 790 acpi_size size = (acpi5) ? 791 sizeof(struct set_error_type_with_address) : 792 sizeof(struct einj_parameter); 793 794 acpi_os_unmap_iomem(einj_param, size); 795 } 796 einj_exec_ctx_init(&ctx); 797 apei_exec_post_unmap_gars(&ctx); 798 apei_resources_release(&einj_resources); 799 apei_resources_fini(&einj_resources); 800 debugfs_remove_recursive(einj_debug_dir); 801 acpi_put_table((struct acpi_table_header *)einj_tab); 802 } 803 804 module_init(einj_init); 805 module_exit(einj_exit); 806 807 MODULE_AUTHOR("Huang Ying"); 808 MODULE_DESCRIPTION("APEI Error INJection support"); 809 MODULE_LICENSE("GPL"); 810