blob: 303f10e03dda946b5aebce3c82c1f07b564ca53b [file] [log] [blame]
Doug Thompsoneb919692009-05-05 20:07:11 +02001#include "amd64_edac.h"
2
Borislav Petkov94baaee2009-09-24 11:05:30 +02003static ssize_t amd64_inject_section_show(struct mem_ctl_info *mci, char *buf)
4{
5 struct amd64_pvt *pvt = mci->pvt_info;
6 return sprintf(buf, "0x%x\n", pvt->injection.section);
7}
8
Doug Thompsoneb919692009-05-05 20:07:11 +02009/*
10 * store error injection section value which refers to one of 4 16-byte sections
11 * within a 64-byte cacheline
12 *
13 * range: 0..3
14 */
15static ssize_t amd64_inject_section_store(struct mem_ctl_info *mci,
16 const char *data, size_t count)
17{
18 struct amd64_pvt *pvt = mci->pvt_info;
19 unsigned long value;
20 int ret = 0;
21
22 ret = strict_strtoul(data, 10, &value);
23 if (ret != -EINVAL) {
Borislav Petkov94baaee2009-09-24 11:05:30 +020024
25 if (value > 3) {
Borislav Petkov24f9a7f2010-10-07 18:29:15 +020026 amd64_warn("%s: invalid section 0x%lx\n", __func__, value);
Borislav Petkov94baaee2009-09-24 11:05:30 +020027 return -EINVAL;
28 }
29
Doug Thompsoneb919692009-05-05 20:07:11 +020030 pvt->injection.section = (u32) value;
31 return count;
32 }
33 return ret;
34}
35
Borislav Petkov94baaee2009-09-24 11:05:30 +020036static ssize_t amd64_inject_word_show(struct mem_ctl_info *mci, char *buf)
37{
38 struct amd64_pvt *pvt = mci->pvt_info;
39 return sprintf(buf, "0x%x\n", pvt->injection.word);
40}
41
Doug Thompsoneb919692009-05-05 20:07:11 +020042/*
43 * store error injection word value which refers to one of 9 16-bit word of the
44 * 16-byte (128-bit + ECC bits) section
45 *
46 * range: 0..8
47 */
48static ssize_t amd64_inject_word_store(struct mem_ctl_info *mci,
49 const char *data, size_t count)
50{
51 struct amd64_pvt *pvt = mci->pvt_info;
52 unsigned long value;
53 int ret = 0;
54
55 ret = strict_strtoul(data, 10, &value);
56 if (ret != -EINVAL) {
57
Borislav Petkov94baaee2009-09-24 11:05:30 +020058 if (value > 8) {
Borislav Petkov24f9a7f2010-10-07 18:29:15 +020059 amd64_warn("%s: invalid word 0x%lx\n", __func__, value);
Borislav Petkov94baaee2009-09-24 11:05:30 +020060 return -EINVAL;
61 }
Doug Thompsoneb919692009-05-05 20:07:11 +020062
Borislav Petkov94baaee2009-09-24 11:05:30 +020063 pvt->injection.word = (u32) value;
Doug Thompsoneb919692009-05-05 20:07:11 +020064 return count;
65 }
66 return ret;
67}
68
Borislav Petkov94baaee2009-09-24 11:05:30 +020069static ssize_t amd64_inject_ecc_vector_show(struct mem_ctl_info *mci, char *buf)
70{
71 struct amd64_pvt *pvt = mci->pvt_info;
72 return sprintf(buf, "0x%x\n", pvt->injection.bit_map);
73}
74
Doug Thompsoneb919692009-05-05 20:07:11 +020075/*
76 * store 16 bit error injection vector which enables injecting errors to the
77 * corresponding bit within the error injection word above. When used during a
78 * DRAM ECC read, it holds the contents of the of the DRAM ECC bits.
79 */
80static ssize_t amd64_inject_ecc_vector_store(struct mem_ctl_info *mci,
81 const char *data, size_t count)
82{
83 struct amd64_pvt *pvt = mci->pvt_info;
84 unsigned long value;
85 int ret = 0;
86
87 ret = strict_strtoul(data, 16, &value);
88 if (ret != -EINVAL) {
89
Borislav Petkov94baaee2009-09-24 11:05:30 +020090 if (value & 0xFFFF0000) {
Borislav Petkov24f9a7f2010-10-07 18:29:15 +020091 amd64_warn("%s: invalid EccVector: 0x%lx\n",
92 __func__, value);
Borislav Petkov94baaee2009-09-24 11:05:30 +020093 return -EINVAL;
94 }
Doug Thompsoneb919692009-05-05 20:07:11 +020095
Borislav Petkov94baaee2009-09-24 11:05:30 +020096 pvt->injection.bit_map = (u32) value;
Doug Thompsoneb919692009-05-05 20:07:11 +020097 return count;
98 }
99 return ret;
100}
101
102/*
103 * Do a DRAM ECC read. Assemble staged values in the pvt area, format into
104 * fields needed by the injection registers and read the NB Array Data Port.
105 */
106static ssize_t amd64_inject_read_store(struct mem_ctl_info *mci,
107 const char *data, size_t count)
108{
109 struct amd64_pvt *pvt = mci->pvt_info;
110 unsigned long value;
111 u32 section, word_bits;
112 int ret = 0;
113
114 ret = strict_strtoul(data, 10, &value);
115 if (ret != -EINVAL) {
116
117 /* Form value to choose 16-byte section of cacheline */
118 section = F10_NB_ARRAY_DRAM_ECC |
119 SET_NB_ARRAY_ADDRESS(pvt->injection.section);
Borislav Petkovb2b0c602010-10-08 18:32:29 +0200120 amd64_write_pci_cfg(pvt->F3, F10_NB_ARRAY_ADDR, section);
Doug Thompsoneb919692009-05-05 20:07:11 +0200121
122 word_bits = SET_NB_DRAM_INJECTION_READ(pvt->injection.word,
123 pvt->injection.bit_map);
124
125 /* Issue 'word' and 'bit' along with the READ request */
Borislav Petkovb2b0c602010-10-08 18:32:29 +0200126 amd64_write_pci_cfg(pvt->F3, F10_NB_ARRAY_DATA, word_bits);
Doug Thompsoneb919692009-05-05 20:07:11 +0200127
128 debugf0("section=0x%x word_bits=0x%x\n", section, word_bits);
129
130 return count;
131 }
132 return ret;
133}
134
135/*
136 * Do a DRAM ECC write. Assemble staged values in the pvt area and format into
137 * fields needed by the injection registers.
138 */
139static ssize_t amd64_inject_write_store(struct mem_ctl_info *mci,
140 const char *data, size_t count)
141{
142 struct amd64_pvt *pvt = mci->pvt_info;
143 unsigned long value;
144 u32 section, word_bits;
145 int ret = 0;
146
147 ret = strict_strtoul(data, 10, &value);
148 if (ret != -EINVAL) {
149
150 /* Form value to choose 16-byte section of cacheline */
151 section = F10_NB_ARRAY_DRAM_ECC |
152 SET_NB_ARRAY_ADDRESS(pvt->injection.section);
Borislav Petkovb2b0c602010-10-08 18:32:29 +0200153 amd64_write_pci_cfg(pvt->F3, F10_NB_ARRAY_ADDR, section);
Doug Thompsoneb919692009-05-05 20:07:11 +0200154
155 word_bits = SET_NB_DRAM_INJECTION_WRITE(pvt->injection.word,
156 pvt->injection.bit_map);
157
158 /* Issue 'word' and 'bit' along with the READ request */
Borislav Petkovb2b0c602010-10-08 18:32:29 +0200159 amd64_write_pci_cfg(pvt->F3, F10_NB_ARRAY_DATA, word_bits);
Doug Thompsoneb919692009-05-05 20:07:11 +0200160
161 debugf0("section=0x%x word_bits=0x%x\n", section, word_bits);
162
163 return count;
164 }
165 return ret;
166}
167
168/*
169 * update NUM_INJ_ATTRS in case you add new members
170 */
171struct mcidev_sysfs_attribute amd64_inj_attrs[] = {
172
173 {
174 .attr = {
175 .name = "inject_section",
176 .mode = (S_IRUGO | S_IWUSR)
177 },
Borislav Petkov94baaee2009-09-24 11:05:30 +0200178 .show = amd64_inject_section_show,
Doug Thompsoneb919692009-05-05 20:07:11 +0200179 .store = amd64_inject_section_store,
180 },
181 {
182 .attr = {
183 .name = "inject_word",
184 .mode = (S_IRUGO | S_IWUSR)
185 },
Borislav Petkov94baaee2009-09-24 11:05:30 +0200186 .show = amd64_inject_word_show,
Doug Thompsoneb919692009-05-05 20:07:11 +0200187 .store = amd64_inject_word_store,
188 },
189 {
190 .attr = {
191 .name = "inject_ecc_vector",
192 .mode = (S_IRUGO | S_IWUSR)
193 },
Borislav Petkov94baaee2009-09-24 11:05:30 +0200194 .show = amd64_inject_ecc_vector_show,
Doug Thompsoneb919692009-05-05 20:07:11 +0200195 .store = amd64_inject_ecc_vector_store,
196 },
197 {
198 .attr = {
199 .name = "inject_write",
200 .mode = (S_IRUGO | S_IWUSR)
201 },
202 .show = NULL,
203 .store = amd64_inject_write_store,
204 },
205 {
206 .attr = {
207 .name = "inject_read",
208 .mode = (S_IRUGO | S_IWUSR)
209 },
210 .show = NULL,
211 .store = amd64_inject_read_store,
212 },
213};