Linux Audio

Check our new training course

Loading...
v6.2
  1// SPDX-License-Identifier: GPL-2.0
  2/*
  3 * UEFI Common Platform Error Record (CPER) support
  4 *
  5 * Copyright (C) 2010, Intel Corp.
  6 *	Author: Huang Ying <ying.huang@intel.com>
  7 *
  8 * CPER is the format used to describe platform hardware error by
  9 * various tables, such as ERST, BERT and HEST etc.
 10 *
 11 * For more information about CPER, please refer to Appendix N of UEFI
 12 * Specification version 2.4.
 
 
 
 
 
 
 
 
 
 
 
 
 
 13 */
 14
 15#include <linux/kernel.h>
 16#include <linux/module.h>
 17#include <linux/time.h>
 18#include <linux/cper.h>
 19#include <linux/dmi.h>
 20#include <linux/acpi.h>
 21#include <linux/pci.h>
 22#include <linux/aer.h>
 23#include <linux/printk.h>
 24#include <linux/bcd.h>
 25#include <acpi/ghes.h>
 26#include <ras/ras_event.h>
 27#include "cper_cxl.h"
 28
 29/*
 30 * CPER record ID need to be unique even after reboot, because record
 31 * ID is used as index for ERST storage, while CPER records from
 32 * multiple boot may co-exist in ERST.
 33 */
 34u64 cper_next_record_id(void)
 35{
 36	static atomic64_t seq;
 37
 38	if (!atomic64_read(&seq)) {
 39		time64_t time = ktime_get_real_seconds();
 40
 41		/*
 42		 * This code is unlikely to still be needed in year 2106,
 43		 * but just in case, let's use a few more bits for timestamps
 44		 * after y2038 to be sure they keep increasing monotonically
 45		 * for the next few hundred years...
 46		 */
 47		if (time < 0x80000000)
 48			atomic64_set(&seq, (ktime_get_real_seconds()) << 32);
 49		else
 50			atomic64_set(&seq, 0x8000000000000000ull |
 51					   ktime_get_real_seconds() << 24);
 52	}
 53
 54	return atomic64_inc_return(&seq);
 55}
 56EXPORT_SYMBOL_GPL(cper_next_record_id);
 57
 58static const char * const severity_strs[] = {
 59	"recoverable",
 60	"fatal",
 61	"corrected",
 62	"info",
 63};
 64
 65const char *cper_severity_str(unsigned int severity)
 66{
 67	return severity < ARRAY_SIZE(severity_strs) ?
 68		severity_strs[severity] : "unknown";
 69}
 70EXPORT_SYMBOL_GPL(cper_severity_str);
 71
 72/*
 73 * cper_print_bits - print strings for set bits
 74 * @pfx: prefix for each line, including log level and prefix string
 75 * @bits: bit mask
 76 * @strs: string array, indexed by bit position
 77 * @strs_size: size of the string array: @strs
 78 *
 79 * For each set bit in @bits, print the corresponding string in @strs.
 80 * If the output length is longer than 80, multiple line will be
 81 * printed, with @pfx is printed at the beginning of each line.
 82 */
 83void cper_print_bits(const char *pfx, unsigned int bits,
 84		     const char * const strs[], unsigned int strs_size)
 85{
 86	int i, len = 0;
 87	const char *str;
 88	char buf[84];
 89
 90	for (i = 0; i < strs_size; i++) {
 91		if (!(bits & (1U << i)))
 92			continue;
 93		str = strs[i];
 94		if (!str)
 95			continue;
 96		if (len && len + strlen(str) + 2 > 80) {
 97			printk("%s\n", buf);
 98			len = 0;
 99		}
100		if (!len)
101			len = snprintf(buf, sizeof(buf), "%s%s", pfx, str);
102		else
103			len += scnprintf(buf+len, sizeof(buf)-len, ", %s", str);
104	}
105	if (len)
106		printk("%s\n", buf);
107}
108
109static const char * const proc_type_strs[] = {
110	"IA32/X64",
111	"IA64",
112	"ARM",
113};
114
115static const char * const proc_isa_strs[] = {
116	"IA32",
117	"IA64",
118	"X64",
119	"ARM A32/T32",
120	"ARM A64",
121};
122
123const char * const cper_proc_error_type_strs[] = {
124	"cache error",
125	"TLB error",
126	"bus error",
127	"micro-architectural error",
128};
129
130static const char * const proc_op_strs[] = {
131	"unknown or generic",
132	"data read",
133	"data write",
134	"instruction execution",
135};
136
137static const char * const proc_flag_strs[] = {
138	"restartable",
139	"precise IP",
140	"overflow",
141	"corrected",
142};
143
144static void cper_print_proc_generic(const char *pfx,
145				    const struct cper_sec_proc_generic *proc)
146{
147	if (proc->validation_bits & CPER_PROC_VALID_TYPE)
148		printk("%s""processor_type: %d, %s\n", pfx, proc->proc_type,
149		       proc->proc_type < ARRAY_SIZE(proc_type_strs) ?
150		       proc_type_strs[proc->proc_type] : "unknown");
151	if (proc->validation_bits & CPER_PROC_VALID_ISA)
152		printk("%s""processor_isa: %d, %s\n", pfx, proc->proc_isa,
153		       proc->proc_isa < ARRAY_SIZE(proc_isa_strs) ?
154		       proc_isa_strs[proc->proc_isa] : "unknown");
155	if (proc->validation_bits & CPER_PROC_VALID_ERROR_TYPE) {
156		printk("%s""error_type: 0x%02x\n", pfx, proc->proc_error_type);
157		cper_print_bits(pfx, proc->proc_error_type,
158				cper_proc_error_type_strs,
159				ARRAY_SIZE(cper_proc_error_type_strs));
160	}
161	if (proc->validation_bits & CPER_PROC_VALID_OPERATION)
162		printk("%s""operation: %d, %s\n", pfx, proc->operation,
163		       proc->operation < ARRAY_SIZE(proc_op_strs) ?
164		       proc_op_strs[proc->operation] : "unknown");
165	if (proc->validation_bits & CPER_PROC_VALID_FLAGS) {
166		printk("%s""flags: 0x%02x\n", pfx, proc->flags);
167		cper_print_bits(pfx, proc->flags, proc_flag_strs,
168				ARRAY_SIZE(proc_flag_strs));
169	}
170	if (proc->validation_bits & CPER_PROC_VALID_LEVEL)
171		printk("%s""level: %d\n", pfx, proc->level);
172	if (proc->validation_bits & CPER_PROC_VALID_VERSION)
173		printk("%s""version_info: 0x%016llx\n", pfx, proc->cpu_version);
174	if (proc->validation_bits & CPER_PROC_VALID_ID)
175		printk("%s""processor_id: 0x%016llx\n", pfx, proc->proc_id);
176	if (proc->validation_bits & CPER_PROC_VALID_TARGET_ADDRESS)
177		printk("%s""target_address: 0x%016llx\n",
178		       pfx, proc->target_addr);
179	if (proc->validation_bits & CPER_PROC_VALID_REQUESTOR_ID)
180		printk("%s""requestor_id: 0x%016llx\n",
181		       pfx, proc->requestor_id);
182	if (proc->validation_bits & CPER_PROC_VALID_RESPONDER_ID)
183		printk("%s""responder_id: 0x%016llx\n",
184		       pfx, proc->responder_id);
185	if (proc->validation_bits & CPER_PROC_VALID_IP)
186		printk("%s""IP: 0x%016llx\n", pfx, proc->ip);
187}
188
189static const char * const mem_err_type_strs[] = {
190	"unknown",
191	"no error",
192	"single-bit ECC",
193	"multi-bit ECC",
194	"single-symbol chipkill ECC",
195	"multi-symbol chipkill ECC",
196	"master abort",
197	"target abort",
198	"parity error",
199	"watchdog timeout",
200	"invalid address",
201	"mirror Broken",
202	"memory sparing",
203	"scrub corrected error",
204	"scrub uncorrected error",
205	"physical memory map-out event",
206};
207
208const char *cper_mem_err_type_str(unsigned int etype)
209{
210	return etype < ARRAY_SIZE(mem_err_type_strs) ?
211		mem_err_type_strs[etype] : "unknown";
212}
213EXPORT_SYMBOL_GPL(cper_mem_err_type_str);
214
215const char *cper_mem_err_status_str(u64 status)
216{
217	switch ((status >> 8) & 0xff) {
218	case  1:	return "Error detected internal to the component";
219	case  4:	return "Storage error in DRAM memory";
220	case  5:	return "Storage error in TLB";
221	case  6:	return "Storage error in cache";
222	case  7:	return "Error in one or more functional units";
223	case  8:	return "Component failed self test";
224	case  9:	return "Overflow or undervalue of internal queue";
225	case 16:	return "Error detected in the bus";
226	case 17:	return "Virtual address not found on IO-TLB or IO-PDIR";
227	case 18:	return "Improper access error";
228	case 19:	return "Access to a memory address which is not mapped to any component";
229	case 20:	return "Loss of Lockstep";
230	case 21:	return "Response not associated with a request";
231	case 22:	return "Bus parity error - must also set the A, C, or D Bits";
232	case 23:	return "Detection of a protocol error";
233	case 24:	return "Detection of a PATH_ERROR";
234	case 25:	return "Bus operation timeout";
235	case 26:	return "A read was issued to data that has been poisoned";
236	default:	return "Reserved";
237	}
238}
239EXPORT_SYMBOL_GPL(cper_mem_err_status_str);
240
241int cper_mem_err_location(struct cper_mem_err_compact *mem, char *msg)
242{
243	u32 len, n;
244
245	if (!msg)
246		return 0;
247
248	n = 0;
249	len = CPER_REC_LEN;
250	if (mem->validation_bits & CPER_MEM_VALID_NODE)
251		n += scnprintf(msg + n, len - n, "node:%d ", mem->node);
252	if (mem->validation_bits & CPER_MEM_VALID_CARD)
253		n += scnprintf(msg + n, len - n, "card:%d ", mem->card);
254	if (mem->validation_bits & CPER_MEM_VALID_MODULE)
255		n += scnprintf(msg + n, len - n, "module:%d ", mem->module);
256	if (mem->validation_bits & CPER_MEM_VALID_RANK_NUMBER)
257		n += scnprintf(msg + n, len - n, "rank:%d ", mem->rank);
258	if (mem->validation_bits & CPER_MEM_VALID_BANK)
259		n += scnprintf(msg + n, len - n, "bank:%d ", mem->bank);
260	if (mem->validation_bits & CPER_MEM_VALID_BANK_GROUP)
261		n += scnprintf(msg + n, len - n, "bank_group:%d ",
262			       mem->bank >> CPER_MEM_BANK_GROUP_SHIFT);
263	if (mem->validation_bits & CPER_MEM_VALID_BANK_ADDRESS)
264		n += scnprintf(msg + n, len - n, "bank_address:%d ",
265			       mem->bank & CPER_MEM_BANK_ADDRESS_MASK);
266	if (mem->validation_bits & CPER_MEM_VALID_DEVICE)
267		n += scnprintf(msg + n, len - n, "device:%d ", mem->device);
268	if (mem->validation_bits & (CPER_MEM_VALID_ROW | CPER_MEM_VALID_ROW_EXT)) {
269		u32 row = mem->row;
270
271		row |= cper_get_mem_extension(mem->validation_bits, mem->extended);
272		n += scnprintf(msg + n, len - n, "row:%d ", row);
273	}
274	if (mem->validation_bits & CPER_MEM_VALID_COLUMN)
275		n += scnprintf(msg + n, len - n, "column:%d ", mem->column);
276	if (mem->validation_bits & CPER_MEM_VALID_BIT_POSITION)
277		n += scnprintf(msg + n, len - n, "bit_position:%d ",
278			       mem->bit_pos);
279	if (mem->validation_bits & CPER_MEM_VALID_REQUESTOR_ID)
280		n += scnprintf(msg + n, len - n, "requestor_id:0x%016llx ",
281			       mem->requestor_id);
282	if (mem->validation_bits & CPER_MEM_VALID_RESPONDER_ID)
283		n += scnprintf(msg + n, len - n, "responder_id:0x%016llx ",
284			       mem->responder_id);
285	if (mem->validation_bits & CPER_MEM_VALID_TARGET_ID)
286		n += scnprintf(msg + n, len - n, "target_id:0x%016llx ",
287			       mem->target_id);
288	if (mem->validation_bits & CPER_MEM_VALID_CHIP_ID)
289		n += scnprintf(msg + n, len - n, "chip_id:%d ",
290			       mem->extended >> CPER_MEM_CHIP_ID_SHIFT);
291
 
292	return n;
293}
294EXPORT_SYMBOL_GPL(cper_mem_err_location);
295
296int cper_dimm_err_location(struct cper_mem_err_compact *mem, char *msg)
297{
298	u32 len, n;
299	const char *bank = NULL, *device = NULL;
300
301	if (!msg || !(mem->validation_bits & CPER_MEM_VALID_MODULE_HANDLE))
302		return 0;
303
304	len = CPER_REC_LEN;
 
305	dmi_memdev_name(mem->mem_dev_handle, &bank, &device);
306	if (bank && device)
307		n = snprintf(msg, len, "DIMM location: %s %s ", bank, device);
308	else
309		n = snprintf(msg, len,
310			     "DIMM location: not present. DMI handle: 0x%.4x ",
311			     mem->mem_dev_handle);
312
 
313	return n;
314}
315EXPORT_SYMBOL_GPL(cper_dimm_err_location);
316
317void cper_mem_err_pack(const struct cper_sec_mem_err *mem,
318		       struct cper_mem_err_compact *cmem)
319{
320	cmem->validation_bits = mem->validation_bits;
321	cmem->node = mem->node;
322	cmem->card = mem->card;
323	cmem->module = mem->module;
324	cmem->bank = mem->bank;
325	cmem->device = mem->device;
326	cmem->row = mem->row;
327	cmem->column = mem->column;
328	cmem->bit_pos = mem->bit_pos;
329	cmem->requestor_id = mem->requestor_id;
330	cmem->responder_id = mem->responder_id;
331	cmem->target_id = mem->target_id;
332	cmem->extended = mem->extended;
333	cmem->rank = mem->rank;
334	cmem->mem_array_handle = mem->mem_array_handle;
335	cmem->mem_dev_handle = mem->mem_dev_handle;
336}
337EXPORT_SYMBOL_GPL(cper_mem_err_pack);
338
339const char *cper_mem_err_unpack(struct trace_seq *p,
340				struct cper_mem_err_compact *cmem)
341{
342	const char *ret = trace_seq_buffer_ptr(p);
343	char rcd_decode_str[CPER_REC_LEN];
344
345	if (cper_mem_err_location(cmem, rcd_decode_str))
346		trace_seq_printf(p, "%s", rcd_decode_str);
347	if (cper_dimm_err_location(cmem, rcd_decode_str))
348		trace_seq_printf(p, "%s", rcd_decode_str);
349	trace_seq_putc(p, '\0');
350
351	return ret;
352}
353
354static void cper_print_mem(const char *pfx, const struct cper_sec_mem_err *mem,
355	int len)
356{
357	struct cper_mem_err_compact cmem;
358	char rcd_decode_str[CPER_REC_LEN];
359
360	/* Don't trust UEFI 2.1/2.2 structure with bad validation bits */
361	if (len == sizeof(struct cper_sec_mem_err_old) &&
362	    (mem->validation_bits & ~(CPER_MEM_VALID_RANK_NUMBER - 1))) {
363		pr_err(FW_WARN "valid bits set for fields beyond structure\n");
364		return;
365	}
366	if (mem->validation_bits & CPER_MEM_VALID_ERROR_STATUS)
367		printk("%s error_status: %s (0x%016llx)\n",
368		       pfx, cper_mem_err_status_str(mem->error_status),
369		       mem->error_status);
370	if (mem->validation_bits & CPER_MEM_VALID_PA)
371		printk("%s""physical_address: 0x%016llx\n",
372		       pfx, mem->physical_addr);
373	if (mem->validation_bits & CPER_MEM_VALID_PA_MASK)
374		printk("%s""physical_address_mask: 0x%016llx\n",
375		       pfx, mem->physical_addr_mask);
376	cper_mem_err_pack(mem, &cmem);
377	if (cper_mem_err_location(&cmem, rcd_decode_str))
378		printk("%s%s\n", pfx, rcd_decode_str);
379	if (mem->validation_bits & CPER_MEM_VALID_ERROR_TYPE) {
380		u8 etype = mem->error_type;
381		printk("%s""error_type: %d, %s\n", pfx, etype,
382		       cper_mem_err_type_str(etype));
383	}
384	if (cper_dimm_err_location(&cmem, rcd_decode_str))
385		printk("%s%s\n", pfx, rcd_decode_str);
386}
387
388static const char * const pcie_port_type_strs[] = {
389	"PCIe end point",
390	"legacy PCI end point",
391	"unknown",
392	"unknown",
393	"root port",
394	"upstream switch port",
395	"downstream switch port",
396	"PCIe to PCI/PCI-X bridge",
397	"PCI/PCI-X to PCIe bridge",
398	"root complex integrated endpoint device",
399	"root complex event collector",
400};
401
402static void cper_print_pcie(const char *pfx, const struct cper_sec_pcie *pcie,
403			    const struct acpi_hest_generic_data *gdata)
404{
405	if (pcie->validation_bits & CPER_PCIE_VALID_PORT_TYPE)
406		printk("%s""port_type: %d, %s\n", pfx, pcie->port_type,
407		       pcie->port_type < ARRAY_SIZE(pcie_port_type_strs) ?
408		       pcie_port_type_strs[pcie->port_type] : "unknown");
409	if (pcie->validation_bits & CPER_PCIE_VALID_VERSION)
410		printk("%s""version: %d.%d\n", pfx,
411		       pcie->version.major, pcie->version.minor);
412	if (pcie->validation_bits & CPER_PCIE_VALID_COMMAND_STATUS)
413		printk("%s""command: 0x%04x, status: 0x%04x\n", pfx,
414		       pcie->command, pcie->status);
415	if (pcie->validation_bits & CPER_PCIE_VALID_DEVICE_ID) {
416		const __u8 *p;
417		printk("%s""device_id: %04x:%02x:%02x.%x\n", pfx,
418		       pcie->device_id.segment, pcie->device_id.bus,
419		       pcie->device_id.device, pcie->device_id.function);
420		printk("%s""slot: %d\n", pfx,
421		       pcie->device_id.slot >> CPER_PCIE_SLOT_SHIFT);
422		printk("%s""secondary_bus: 0x%02x\n", pfx,
423		       pcie->device_id.secondary_bus);
424		printk("%s""vendor_id: 0x%04x, device_id: 0x%04x\n", pfx,
425		       pcie->device_id.vendor_id, pcie->device_id.device_id);
426		p = pcie->device_id.class_code;
427		printk("%s""class_code: %02x%02x%02x\n", pfx, p[2], p[1], p[0]);
428	}
429	if (pcie->validation_bits & CPER_PCIE_VALID_SERIAL_NUMBER)
430		printk("%s""serial number: 0x%04x, 0x%04x\n", pfx,
431		       pcie->serial_number.lower, pcie->serial_number.upper);
432	if (pcie->validation_bits & CPER_PCIE_VALID_BRIDGE_CONTROL_STATUS)
433		printk(
434	"%s""bridge: secondary_status: 0x%04x, control: 0x%04x\n",
435	pfx, pcie->bridge.secondary_status, pcie->bridge.control);
436
437	/* Fatal errors call __ghes_panic() before AER handler prints this */
438	if ((pcie->validation_bits & CPER_PCIE_VALID_AER_INFO) &&
439	    (gdata->error_severity & CPER_SEV_FATAL)) {
440		struct aer_capability_regs *aer;
441
442		aer = (struct aer_capability_regs *)pcie->aer_info;
443		printk("%saer_uncor_status: 0x%08x, aer_uncor_mask: 0x%08x\n",
444		       pfx, aer->uncor_status, aer->uncor_mask);
445		printk("%saer_uncor_severity: 0x%08x\n",
446		       pfx, aer->uncor_severity);
447		printk("%sTLP Header: %08x %08x %08x %08x\n", pfx,
448		       aer->header_log.dw0, aer->header_log.dw1,
449		       aer->header_log.dw2, aer->header_log.dw3);
450	}
451}
452
453static const char * const fw_err_rec_type_strs[] = {
454	"IPF SAL Error Record",
455	"SOC Firmware Error Record Type1 (Legacy CrashLog Support)",
456	"SOC Firmware Error Record Type2",
457};
458
459static void cper_print_fw_err(const char *pfx,
460			      struct acpi_hest_generic_data *gdata,
461			      const struct cper_sec_fw_err_rec_ref *fw_err)
462{
463	void *buf = acpi_hest_get_payload(gdata);
464	u32 offset, length = gdata->error_data_length;
465
466	printk("%s""Firmware Error Record Type: %s\n", pfx,
467	       fw_err->record_type < ARRAY_SIZE(fw_err_rec_type_strs) ?
468	       fw_err_rec_type_strs[fw_err->record_type] : "unknown");
469	printk("%s""Revision: %d\n", pfx, fw_err->revision);
470
471	/* Record Type based on UEFI 2.7 */
472	if (fw_err->revision == 0) {
473		printk("%s""Record Identifier: %08llx\n", pfx,
474		       fw_err->record_identifier);
475	} else if (fw_err->revision == 2) {
476		printk("%s""Record Identifier: %pUl\n", pfx,
477		       &fw_err->record_identifier_guid);
478	}
479
480	/*
481	 * The FW error record may contain trailing data beyond the
482	 * structure defined by the specification. As the fields
483	 * defined (and hence the offset of any trailing data) vary
484	 * with the revision, set the offset to account for this
485	 * variation.
486	 */
487	if (fw_err->revision == 0) {
488		/* record_identifier_guid not defined */
489		offset = offsetof(struct cper_sec_fw_err_rec_ref,
490				  record_identifier_guid);
491	} else if (fw_err->revision == 1) {
492		/* record_identifier not defined */
493		offset = offsetof(struct cper_sec_fw_err_rec_ref,
494				  record_identifier);
495	} else {
496		offset = sizeof(*fw_err);
497	}
498
499	buf += offset;
500	length -= offset;
501
502	print_hex_dump(pfx, "", DUMP_PREFIX_OFFSET, 16, 4, buf, length, true);
503}
504
505static void cper_print_tstamp(const char *pfx,
506				   struct acpi_hest_generic_data_v300 *gdata)
507{
508	__u8 hour, min, sec, day, mon, year, century, *timestamp;
509
510	if (gdata->validation_bits & ACPI_HEST_GEN_VALID_TIMESTAMP) {
511		timestamp = (__u8 *)&(gdata->time_stamp);
512		sec       = bcd2bin(timestamp[0]);
513		min       = bcd2bin(timestamp[1]);
514		hour      = bcd2bin(timestamp[2]);
515		day       = bcd2bin(timestamp[4]);
516		mon       = bcd2bin(timestamp[5]);
517		year      = bcd2bin(timestamp[6]);
518		century   = bcd2bin(timestamp[7]);
519
520		printk("%s%ststamp: %02d%02d-%02d-%02d %02d:%02d:%02d\n", pfx,
521		       (timestamp[3] & 0x1 ? "precise " : "imprecise "),
522		       century, year, mon, day, hour, min, sec);
523	}
524}
525
526static void
527cper_estatus_print_section(const char *pfx, struct acpi_hest_generic_data *gdata,
528			   int sec_no)
529{
530	guid_t *sec_type = (guid_t *)gdata->section_type;
531	__u16 severity;
532	char newpfx[64];
533
534	if (acpi_hest_get_version(gdata) >= 3)
535		cper_print_tstamp(pfx, (struct acpi_hest_generic_data_v300 *)gdata);
536
537	severity = gdata->error_severity;
538	printk("%s""Error %d, type: %s\n", pfx, sec_no,
539	       cper_severity_str(severity));
540	if (gdata->validation_bits & CPER_SEC_VALID_FRU_ID)
541		printk("%s""fru_id: %pUl\n", pfx, gdata->fru_id);
542	if (gdata->validation_bits & CPER_SEC_VALID_FRU_TEXT)
543		printk("%s""fru_text: %.20s\n", pfx, gdata->fru_text);
544
545	snprintf(newpfx, sizeof(newpfx), "%s ", pfx);
546	if (guid_equal(sec_type, &CPER_SEC_PROC_GENERIC)) {
547		struct cper_sec_proc_generic *proc_err = acpi_hest_get_payload(gdata);
548
549		printk("%s""section_type: general processor error\n", newpfx);
550		if (gdata->error_data_length >= sizeof(*proc_err))
551			cper_print_proc_generic(newpfx, proc_err);
552		else
553			goto err_section_too_small;
554	} else if (guid_equal(sec_type, &CPER_SEC_PLATFORM_MEM)) {
555		struct cper_sec_mem_err *mem_err = acpi_hest_get_payload(gdata);
556
557		printk("%s""section_type: memory error\n", newpfx);
558		if (gdata->error_data_length >=
559		    sizeof(struct cper_sec_mem_err_old))
560			cper_print_mem(newpfx, mem_err,
561				       gdata->error_data_length);
562		else
563			goto err_section_too_small;
564	} else if (guid_equal(sec_type, &CPER_SEC_PCIE)) {
565		struct cper_sec_pcie *pcie = acpi_hest_get_payload(gdata);
566
567		printk("%s""section_type: PCIe error\n", newpfx);
568		if (gdata->error_data_length >= sizeof(*pcie))
569			cper_print_pcie(newpfx, pcie, gdata);
570		else
571			goto err_section_too_small;
572#if defined(CONFIG_ARM64) || defined(CONFIG_ARM)
573	} else if (guid_equal(sec_type, &CPER_SEC_PROC_ARM)) {
574		struct cper_sec_proc_arm *arm_err = acpi_hest_get_payload(gdata);
575
576		printk("%ssection_type: ARM processor error\n", newpfx);
577		if (gdata->error_data_length >= sizeof(*arm_err))
578			cper_print_proc_arm(newpfx, arm_err);
579		else
580			goto err_section_too_small;
581#endif
582#if defined(CONFIG_UEFI_CPER_X86)
583	} else if (guid_equal(sec_type, &CPER_SEC_PROC_IA)) {
584		struct cper_sec_proc_ia *ia_err = acpi_hest_get_payload(gdata);
585
586		printk("%ssection_type: IA32/X64 processor error\n", newpfx);
587		if (gdata->error_data_length >= sizeof(*ia_err))
588			cper_print_proc_ia(newpfx, ia_err);
589		else
590			goto err_section_too_small;
591#endif
592	} else if (guid_equal(sec_type, &CPER_SEC_FW_ERR_REC_REF)) {
593		struct cper_sec_fw_err_rec_ref *fw_err = acpi_hest_get_payload(gdata);
594
595		printk("%ssection_type: Firmware Error Record Reference\n",
596		       newpfx);
597		/* The minimal FW Error Record contains 16 bytes */
598		if (gdata->error_data_length >= SZ_16)
599			cper_print_fw_err(newpfx, gdata, fw_err);
600		else
601			goto err_section_too_small;
602	} else if (guid_equal(sec_type, &CPER_SEC_CXL_PROT_ERR)) {
603		struct cper_sec_prot_err *prot_err = acpi_hest_get_payload(gdata);
604
605		printk("%ssection_type: CXL Protocol Error\n", newpfx);
606		if (gdata->error_data_length >= sizeof(*prot_err))
607			cper_print_prot_err(newpfx, prot_err);
608		else
609			goto err_section_too_small;
610	} else {
611		const void *err = acpi_hest_get_payload(gdata);
612
613		printk("%ssection type: unknown, %pUl\n", newpfx, sec_type);
614		printk("%ssection length: %#x\n", newpfx,
615		       gdata->error_data_length);
616		print_hex_dump(newpfx, "", DUMP_PREFIX_OFFSET, 16, 4, err,
617			       gdata->error_data_length, true);
618	}
619
620	return;
621
622err_section_too_small:
623	pr_err(FW_WARN "error section length is too small\n");
624}
625
626void cper_estatus_print(const char *pfx,
627			const struct acpi_hest_generic_status *estatus)
628{
629	struct acpi_hest_generic_data *gdata;
 
630	int sec_no = 0;
631	char newpfx[64];
632	__u16 severity;
633
634	severity = estatus->error_severity;
635	if (severity == CPER_SEV_CORRECTED)
636		printk("%s%s\n", pfx,
637		       "It has been corrected by h/w "
638		       "and requires no further action");
639	printk("%s""event severity: %s\n", pfx, cper_severity_str(severity));
640	snprintf(newpfx, sizeof(newpfx), "%s ", pfx);
641
642	apei_estatus_for_each_section(estatus, gdata) {
 
 
643		cper_estatus_print_section(newpfx, gdata, sec_no);
 
 
644		sec_no++;
645	}
646}
647EXPORT_SYMBOL_GPL(cper_estatus_print);
648
649int cper_estatus_check_header(const struct acpi_hest_generic_status *estatus)
650{
651	if (estatus->data_length &&
652	    estatus->data_length < sizeof(struct acpi_hest_generic_data))
653		return -EINVAL;
654	if (estatus->raw_data_length &&
655	    estatus->raw_data_offset < sizeof(*estatus) + estatus->data_length)
656		return -EINVAL;
657
658	return 0;
659}
660EXPORT_SYMBOL_GPL(cper_estatus_check_header);
661
662int cper_estatus_check(const struct acpi_hest_generic_status *estatus)
663{
664	struct acpi_hest_generic_data *gdata;
665	unsigned int data_len, record_size;
666	int rc;
667
668	rc = cper_estatus_check_header(estatus);
669	if (rc)
670		return rc;
671
672	data_len = estatus->data_length;
673
674	apei_estatus_for_each_section(estatus, gdata) {
675		if (acpi_hest_get_size(gdata) > data_len)
 
676			return -EINVAL;
677
678		record_size = acpi_hest_get_record_size(gdata);
679		if (record_size > data_len)
680			return -EINVAL;
681
682		data_len -= record_size;
683	}
684	if (data_len)
685		return -EINVAL;
686
687	return 0;
688}
689EXPORT_SYMBOL_GPL(cper_estatus_check);
v4.10.11
 
  1/*
  2 * UEFI Common Platform Error Record (CPER) support
  3 *
  4 * Copyright (C) 2010, Intel Corp.
  5 *	Author: Huang Ying <ying.huang@intel.com>
  6 *
  7 * CPER is the format used to describe platform hardware error by
  8 * various tables, such as ERST, BERT and HEST etc.
  9 *
 10 * For more information about CPER, please refer to Appendix N of UEFI
 11 * Specification version 2.4.
 12 *
 13 * This program is free software; you can redistribute it and/or
 14 * modify it under the terms of the GNU General Public License version
 15 * 2 as published by the Free Software Foundation.
 16 *
 17 * This program is distributed in the hope that it will be useful,
 18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 20 * GNU General Public License for more details.
 21 *
 22 * You should have received a copy of the GNU General Public License
 23 * along with this program; if not, write to the Free Software
 24 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 25 */
 26
 27#include <linux/kernel.h>
 28#include <linux/module.h>
 29#include <linux/time.h>
 30#include <linux/cper.h>
 31#include <linux/dmi.h>
 32#include <linux/acpi.h>
 33#include <linux/pci.h>
 34#include <linux/aer.h>
 35
 36#define INDENT_SP	" "
 37
 38static char rcd_decode_str[CPER_REC_LEN];
 
 39
 40/*
 41 * CPER record ID need to be unique even after reboot, because record
 42 * ID is used as index for ERST storage, while CPER records from
 43 * multiple boot may co-exist in ERST.
 44 */
 45u64 cper_next_record_id(void)
 46{
 47	static atomic64_t seq;
 48
 49	if (!atomic64_read(&seq))
 50		atomic64_set(&seq, ((u64)get_seconds()) << 32);
 
 
 
 
 
 
 
 
 
 
 
 
 
 51
 52	return atomic64_inc_return(&seq);
 53}
 54EXPORT_SYMBOL_GPL(cper_next_record_id);
 55
 56static const char * const severity_strs[] = {
 57	"recoverable",
 58	"fatal",
 59	"corrected",
 60	"info",
 61};
 62
 63const char *cper_severity_str(unsigned int severity)
 64{
 65	return severity < ARRAY_SIZE(severity_strs) ?
 66		severity_strs[severity] : "unknown";
 67}
 68EXPORT_SYMBOL_GPL(cper_severity_str);
 69
 70/*
 71 * cper_print_bits - print strings for set bits
 72 * @pfx: prefix for each line, including log level and prefix string
 73 * @bits: bit mask
 74 * @strs: string array, indexed by bit position
 75 * @strs_size: size of the string array: @strs
 76 *
 77 * For each set bit in @bits, print the corresponding string in @strs.
 78 * If the output length is longer than 80, multiple line will be
 79 * printed, with @pfx is printed at the beginning of each line.
 80 */
 81void cper_print_bits(const char *pfx, unsigned int bits,
 82		     const char * const strs[], unsigned int strs_size)
 83{
 84	int i, len = 0;
 85	const char *str;
 86	char buf[84];
 87
 88	for (i = 0; i < strs_size; i++) {
 89		if (!(bits & (1U << i)))
 90			continue;
 91		str = strs[i];
 92		if (!str)
 93			continue;
 94		if (len && len + strlen(str) + 2 > 80) {
 95			printk("%s\n", buf);
 96			len = 0;
 97		}
 98		if (!len)
 99			len = snprintf(buf, sizeof(buf), "%s%s", pfx, str);
100		else
101			len += snprintf(buf+len, sizeof(buf)-len, ", %s", str);
102	}
103	if (len)
104		printk("%s\n", buf);
105}
106
107static const char * const proc_type_strs[] = {
108	"IA32/X64",
109	"IA64",
 
110};
111
112static const char * const proc_isa_strs[] = {
113	"IA32",
114	"IA64",
115	"X64",
 
 
116};
117
118static const char * const proc_error_type_strs[] = {
119	"cache error",
120	"TLB error",
121	"bus error",
122	"micro-architectural error",
123};
124
125static const char * const proc_op_strs[] = {
126	"unknown or generic",
127	"data read",
128	"data write",
129	"instruction execution",
130};
131
132static const char * const proc_flag_strs[] = {
133	"restartable",
134	"precise IP",
135	"overflow",
136	"corrected",
137};
138
139static void cper_print_proc_generic(const char *pfx,
140				    const struct cper_sec_proc_generic *proc)
141{
142	if (proc->validation_bits & CPER_PROC_VALID_TYPE)
143		printk("%s""processor_type: %d, %s\n", pfx, proc->proc_type,
144		       proc->proc_type < ARRAY_SIZE(proc_type_strs) ?
145		       proc_type_strs[proc->proc_type] : "unknown");
146	if (proc->validation_bits & CPER_PROC_VALID_ISA)
147		printk("%s""processor_isa: %d, %s\n", pfx, proc->proc_isa,
148		       proc->proc_isa < ARRAY_SIZE(proc_isa_strs) ?
149		       proc_isa_strs[proc->proc_isa] : "unknown");
150	if (proc->validation_bits & CPER_PROC_VALID_ERROR_TYPE) {
151		printk("%s""error_type: 0x%02x\n", pfx, proc->proc_error_type);
152		cper_print_bits(pfx, proc->proc_error_type,
153				proc_error_type_strs,
154				ARRAY_SIZE(proc_error_type_strs));
155	}
156	if (proc->validation_bits & CPER_PROC_VALID_OPERATION)
157		printk("%s""operation: %d, %s\n", pfx, proc->operation,
158		       proc->operation < ARRAY_SIZE(proc_op_strs) ?
159		       proc_op_strs[proc->operation] : "unknown");
160	if (proc->validation_bits & CPER_PROC_VALID_FLAGS) {
161		printk("%s""flags: 0x%02x\n", pfx, proc->flags);
162		cper_print_bits(pfx, proc->flags, proc_flag_strs,
163				ARRAY_SIZE(proc_flag_strs));
164	}
165	if (proc->validation_bits & CPER_PROC_VALID_LEVEL)
166		printk("%s""level: %d\n", pfx, proc->level);
167	if (proc->validation_bits & CPER_PROC_VALID_VERSION)
168		printk("%s""version_info: 0x%016llx\n", pfx, proc->cpu_version);
169	if (proc->validation_bits & CPER_PROC_VALID_ID)
170		printk("%s""processor_id: 0x%016llx\n", pfx, proc->proc_id);
171	if (proc->validation_bits & CPER_PROC_VALID_TARGET_ADDRESS)
172		printk("%s""target_address: 0x%016llx\n",
173		       pfx, proc->target_addr);
174	if (proc->validation_bits & CPER_PROC_VALID_REQUESTOR_ID)
175		printk("%s""requestor_id: 0x%016llx\n",
176		       pfx, proc->requestor_id);
177	if (proc->validation_bits & CPER_PROC_VALID_RESPONDER_ID)
178		printk("%s""responder_id: 0x%016llx\n",
179		       pfx, proc->responder_id);
180	if (proc->validation_bits & CPER_PROC_VALID_IP)
181		printk("%s""IP: 0x%016llx\n", pfx, proc->ip);
182}
183
184static const char * const mem_err_type_strs[] = {
185	"unknown",
186	"no error",
187	"single-bit ECC",
188	"multi-bit ECC",
189	"single-symbol chipkill ECC",
190	"multi-symbol chipkill ECC",
191	"master abort",
192	"target abort",
193	"parity error",
194	"watchdog timeout",
195	"invalid address",
196	"mirror Broken",
197	"memory sparing",
198	"scrub corrected error",
199	"scrub uncorrected error",
200	"physical memory map-out event",
201};
202
203const char *cper_mem_err_type_str(unsigned int etype)
204{
205	return etype < ARRAY_SIZE(mem_err_type_strs) ?
206		mem_err_type_strs[etype] : "unknown";
207}
208EXPORT_SYMBOL_GPL(cper_mem_err_type_str);
209
210static int cper_mem_err_location(struct cper_mem_err_compact *mem, char *msg)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
211{
212	u32 len, n;
213
214	if (!msg)
215		return 0;
216
217	n = 0;
218	len = CPER_REC_LEN - 1;
219	if (mem->validation_bits & CPER_MEM_VALID_NODE)
220		n += scnprintf(msg + n, len - n, "node: %d ", mem->node);
221	if (mem->validation_bits & CPER_MEM_VALID_CARD)
222		n += scnprintf(msg + n, len - n, "card: %d ", mem->card);
223	if (mem->validation_bits & CPER_MEM_VALID_MODULE)
224		n += scnprintf(msg + n, len - n, "module: %d ", mem->module);
225	if (mem->validation_bits & CPER_MEM_VALID_RANK_NUMBER)
226		n += scnprintf(msg + n, len - n, "rank: %d ", mem->rank);
227	if (mem->validation_bits & CPER_MEM_VALID_BANK)
228		n += scnprintf(msg + n, len - n, "bank: %d ", mem->bank);
 
 
 
 
 
 
229	if (mem->validation_bits & CPER_MEM_VALID_DEVICE)
230		n += scnprintf(msg + n, len - n, "device: %d ", mem->device);
231	if (mem->validation_bits & CPER_MEM_VALID_ROW)
232		n += scnprintf(msg + n, len - n, "row: %d ", mem->row);
 
 
 
 
233	if (mem->validation_bits & CPER_MEM_VALID_COLUMN)
234		n += scnprintf(msg + n, len - n, "column: %d ", mem->column);
235	if (mem->validation_bits & CPER_MEM_VALID_BIT_POSITION)
236		n += scnprintf(msg + n, len - n, "bit_position: %d ",
237			       mem->bit_pos);
238	if (mem->validation_bits & CPER_MEM_VALID_REQUESTOR_ID)
239		n += scnprintf(msg + n, len - n, "requestor_id: 0x%016llx ",
240			       mem->requestor_id);
241	if (mem->validation_bits & CPER_MEM_VALID_RESPONDER_ID)
242		n += scnprintf(msg + n, len - n, "responder_id: 0x%016llx ",
243			       mem->responder_id);
244	if (mem->validation_bits & CPER_MEM_VALID_TARGET_ID)
245		scnprintf(msg + n, len - n, "target_id: 0x%016llx ",
246			  mem->target_id);
 
 
 
247
248	msg[n] = '\0';
249	return n;
250}
 
251
252static int cper_dimm_err_location(struct cper_mem_err_compact *mem, char *msg)
253{
254	u32 len, n;
255	const char *bank = NULL, *device = NULL;
256
257	if (!msg || !(mem->validation_bits & CPER_MEM_VALID_MODULE_HANDLE))
258		return 0;
259
260	n = 0;
261	len = CPER_REC_LEN - 1;
262	dmi_memdev_name(mem->mem_dev_handle, &bank, &device);
263	if (bank && device)
264		n = snprintf(msg, len, "DIMM location: %s %s ", bank, device);
265	else
266		n = snprintf(msg, len,
267			     "DIMM location: not present. DMI handle: 0x%.4x ",
268			     mem->mem_dev_handle);
269
270	msg[n] = '\0';
271	return n;
272}
 
273
274void cper_mem_err_pack(const struct cper_sec_mem_err *mem,
275		       struct cper_mem_err_compact *cmem)
276{
277	cmem->validation_bits = mem->validation_bits;
278	cmem->node = mem->node;
279	cmem->card = mem->card;
280	cmem->module = mem->module;
281	cmem->bank = mem->bank;
282	cmem->device = mem->device;
283	cmem->row = mem->row;
284	cmem->column = mem->column;
285	cmem->bit_pos = mem->bit_pos;
286	cmem->requestor_id = mem->requestor_id;
287	cmem->responder_id = mem->responder_id;
288	cmem->target_id = mem->target_id;
 
289	cmem->rank = mem->rank;
290	cmem->mem_array_handle = mem->mem_array_handle;
291	cmem->mem_dev_handle = mem->mem_dev_handle;
292}
 
293
294const char *cper_mem_err_unpack(struct trace_seq *p,
295				struct cper_mem_err_compact *cmem)
296{
297	const char *ret = trace_seq_buffer_ptr(p);
 
298
299	if (cper_mem_err_location(cmem, rcd_decode_str))
300		trace_seq_printf(p, "%s", rcd_decode_str);
301	if (cper_dimm_err_location(cmem, rcd_decode_str))
302		trace_seq_printf(p, "%s", rcd_decode_str);
303	trace_seq_putc(p, '\0');
304
305	return ret;
306}
307
308static void cper_print_mem(const char *pfx, const struct cper_sec_mem_err *mem,
309	int len)
310{
311	struct cper_mem_err_compact cmem;
 
312
313	/* Don't trust UEFI 2.1/2.2 structure with bad validation bits */
314	if (len == sizeof(struct cper_sec_mem_err_old) &&
315	    (mem->validation_bits & ~(CPER_MEM_VALID_RANK_NUMBER - 1))) {
316		pr_err(FW_WARN "valid bits set for fields beyond structure\n");
317		return;
318	}
319	if (mem->validation_bits & CPER_MEM_VALID_ERROR_STATUS)
320		printk("%s""error_status: 0x%016llx\n", pfx, mem->error_status);
 
 
321	if (mem->validation_bits & CPER_MEM_VALID_PA)
322		printk("%s""physical_address: 0x%016llx\n",
323		       pfx, mem->physical_addr);
324	if (mem->validation_bits & CPER_MEM_VALID_PA_MASK)
325		printk("%s""physical_address_mask: 0x%016llx\n",
326		       pfx, mem->physical_addr_mask);
327	cper_mem_err_pack(mem, &cmem);
328	if (cper_mem_err_location(&cmem, rcd_decode_str))
329		printk("%s%s\n", pfx, rcd_decode_str);
330	if (mem->validation_bits & CPER_MEM_VALID_ERROR_TYPE) {
331		u8 etype = mem->error_type;
332		printk("%s""error_type: %d, %s\n", pfx, etype,
333		       cper_mem_err_type_str(etype));
334	}
335	if (cper_dimm_err_location(&cmem, rcd_decode_str))
336		printk("%s%s\n", pfx, rcd_decode_str);
337}
338
339static const char * const pcie_port_type_strs[] = {
340	"PCIe end point",
341	"legacy PCI end point",
342	"unknown",
343	"unknown",
344	"root port",
345	"upstream switch port",
346	"downstream switch port",
347	"PCIe to PCI/PCI-X bridge",
348	"PCI/PCI-X to PCIe bridge",
349	"root complex integrated endpoint device",
350	"root complex event collector",
351};
352
353static void cper_print_pcie(const char *pfx, const struct cper_sec_pcie *pcie,
354			    const struct acpi_hest_generic_data *gdata)
355{
356	if (pcie->validation_bits & CPER_PCIE_VALID_PORT_TYPE)
357		printk("%s""port_type: %d, %s\n", pfx, pcie->port_type,
358		       pcie->port_type < ARRAY_SIZE(pcie_port_type_strs) ?
359		       pcie_port_type_strs[pcie->port_type] : "unknown");
360	if (pcie->validation_bits & CPER_PCIE_VALID_VERSION)
361		printk("%s""version: %d.%d\n", pfx,
362		       pcie->version.major, pcie->version.minor);
363	if (pcie->validation_bits & CPER_PCIE_VALID_COMMAND_STATUS)
364		printk("%s""command: 0x%04x, status: 0x%04x\n", pfx,
365		       pcie->command, pcie->status);
366	if (pcie->validation_bits & CPER_PCIE_VALID_DEVICE_ID) {
367		const __u8 *p;
368		printk("%s""device_id: %04x:%02x:%02x.%x\n", pfx,
369		       pcie->device_id.segment, pcie->device_id.bus,
370		       pcie->device_id.device, pcie->device_id.function);
371		printk("%s""slot: %d\n", pfx,
372		       pcie->device_id.slot >> CPER_PCIE_SLOT_SHIFT);
373		printk("%s""secondary_bus: 0x%02x\n", pfx,
374		       pcie->device_id.secondary_bus);
375		printk("%s""vendor_id: 0x%04x, device_id: 0x%04x\n", pfx,
376		       pcie->device_id.vendor_id, pcie->device_id.device_id);
377		p = pcie->device_id.class_code;
378		printk("%s""class_code: %02x%02x%02x\n", pfx, p[0], p[1], p[2]);
379	}
380	if (pcie->validation_bits & CPER_PCIE_VALID_SERIAL_NUMBER)
381		printk("%s""serial number: 0x%04x, 0x%04x\n", pfx,
382		       pcie->serial_number.lower, pcie->serial_number.upper);
383	if (pcie->validation_bits & CPER_PCIE_VALID_BRIDGE_CONTROL_STATUS)
384		printk(
385	"%s""bridge: secondary_status: 0x%04x, control: 0x%04x\n",
386	pfx, pcie->bridge.secondary_status, pcie->bridge.control);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
387}
388
389static void cper_estatus_print_section(
390	const char *pfx, const struct acpi_hest_generic_data *gdata, int sec_no)
391{
392	uuid_le *sec_type = (uuid_le *)gdata->section_type;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
393	__u16 severity;
394	char newpfx[64];
395
 
 
 
396	severity = gdata->error_severity;
397	printk("%s""Error %d, type: %s\n", pfx, sec_no,
398	       cper_severity_str(severity));
399	if (gdata->validation_bits & CPER_SEC_VALID_FRU_ID)
400		printk("%s""fru_id: %pUl\n", pfx, (uuid_le *)gdata->fru_id);
401	if (gdata->validation_bits & CPER_SEC_VALID_FRU_TEXT)
402		printk("%s""fru_text: %.20s\n", pfx, gdata->fru_text);
403
404	snprintf(newpfx, sizeof(newpfx), "%s%s", pfx, INDENT_SP);
405	if (!uuid_le_cmp(*sec_type, CPER_SEC_PROC_GENERIC)) {
406		struct cper_sec_proc_generic *proc_err = (void *)(gdata + 1);
 
407		printk("%s""section_type: general processor error\n", newpfx);
408		if (gdata->error_data_length >= sizeof(*proc_err))
409			cper_print_proc_generic(newpfx, proc_err);
410		else
411			goto err_section_too_small;
412	} else if (!uuid_le_cmp(*sec_type, CPER_SEC_PLATFORM_MEM)) {
413		struct cper_sec_mem_err *mem_err = (void *)(gdata + 1);
 
414		printk("%s""section_type: memory error\n", newpfx);
415		if (gdata->error_data_length >=
416		    sizeof(struct cper_sec_mem_err_old))
417			cper_print_mem(newpfx, mem_err,
418				       gdata->error_data_length);
419		else
420			goto err_section_too_small;
421	} else if (!uuid_le_cmp(*sec_type, CPER_SEC_PCIE)) {
422		struct cper_sec_pcie *pcie = (void *)(gdata + 1);
 
423		printk("%s""section_type: PCIe error\n", newpfx);
424		if (gdata->error_data_length >= sizeof(*pcie))
425			cper_print_pcie(newpfx, pcie, gdata);
426		else
427			goto err_section_too_small;
428	} else
429		printk("%s""section type: unknown, %pUl\n", newpfx, sec_type);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
430
431	return;
432
433err_section_too_small:
434	pr_err(FW_WARN "error section length is too small\n");
435}
436
437void cper_estatus_print(const char *pfx,
438			const struct acpi_hest_generic_status *estatus)
439{
440	struct acpi_hest_generic_data *gdata;
441	unsigned int data_len, gedata_len;
442	int sec_no = 0;
443	char newpfx[64];
444	__u16 severity;
445
446	severity = estatus->error_severity;
447	if (severity == CPER_SEV_CORRECTED)
448		printk("%s%s\n", pfx,
449		       "It has been corrected by h/w "
450		       "and requires no further action");
451	printk("%s""event severity: %s\n", pfx, cper_severity_str(severity));
452	data_len = estatus->data_length;
453	gdata = (struct acpi_hest_generic_data *)(estatus + 1);
454	snprintf(newpfx, sizeof(newpfx), "%s%s", pfx, INDENT_SP);
455	while (data_len >= sizeof(*gdata)) {
456		gedata_len = gdata->error_data_length;
457		cper_estatus_print_section(newpfx, gdata, sec_no);
458		data_len -= gedata_len + sizeof(*gdata);
459		gdata = (void *)(gdata + 1) + gedata_len;
460		sec_no++;
461	}
462}
463EXPORT_SYMBOL_GPL(cper_estatus_print);
464
465int cper_estatus_check_header(const struct acpi_hest_generic_status *estatus)
466{
467	if (estatus->data_length &&
468	    estatus->data_length < sizeof(struct acpi_hest_generic_data))
469		return -EINVAL;
470	if (estatus->raw_data_length &&
471	    estatus->raw_data_offset < sizeof(*estatus) + estatus->data_length)
472		return -EINVAL;
473
474	return 0;
475}
476EXPORT_SYMBOL_GPL(cper_estatus_check_header);
477
478int cper_estatus_check(const struct acpi_hest_generic_status *estatus)
479{
480	struct acpi_hest_generic_data *gdata;
481	unsigned int data_len, gedata_len;
482	int rc;
483
484	rc = cper_estatus_check_header(estatus);
485	if (rc)
486		return rc;
 
487	data_len = estatus->data_length;
488	gdata = (struct acpi_hest_generic_data *)(estatus + 1);
489	while (data_len >= sizeof(*gdata)) {
490		gedata_len = gdata->error_data_length;
491		if (gedata_len > data_len - sizeof(*gdata))
492			return -EINVAL;
493		data_len -= gedata_len + sizeof(*gdata);
494		gdata = (void *)(gdata + 1) + gedata_len;
 
 
 
 
495	}
496	if (data_len)
497		return -EINVAL;
498
499	return 0;
500}
501EXPORT_SYMBOL_GPL(cper_estatus_check);