From: Mauro Carvalho Chehab <mchehab@redhat.com>
To: Borislav Petkov <borislav.petkov@amd.com>
Cc: akpm@linux-foundation.org, greg@kroah.com, mingo@elte.hu,
tglx@linutronix.de, hpa@zytor.com, dougthompson@xmission.com,
linux-kernel@vger.kernel.org
Subject: Re: [PATCH 20/21] amd64_edac: add DRAM error injection logic using sysfs
Date: Mon, 04 May 2009 21:06:51 -0300 [thread overview]
Message-ID: <49FF831B.4030302@redhat.com> (raw)
In-Reply-To: <1241024107-14535-21-git-send-email-borislav.petkov@amd.com>
Borislav Petkov escreveu:
> From: Doug Thompson <dougthompson@xmission.com>
>
> Signed-off-by: Doug Thompson <dougthompson@xmission.com>
> Signed-off-by: Borislav Petkov <borislav.petkov@amd.com>
> ---
> drivers/edac/amd64_edac.c | 287 +++++++++++++++++++++++++++++++++++++++++++++
> 1 files changed, 287 insertions(+), 0 deletions(-)
>
> diff --git a/drivers/edac/amd64_edac.c b/drivers/edac/amd64_edac.c
> index b1a7e8c..4d1076f 100644
> --- a/drivers/edac/amd64_edac.c
> +++ b/drivers/edac/amd64_edac.c
> @@ -4621,3 +4621,290 @@ static ssize_t amd64_hole_show(struct mem_ctl_info *mci, char *data)
>
> #endif /* DEBUG */
>
> +#ifdef CONFIG_EDAC_AMD64_OPTERON_ERROR_INJECTION
> +/*
> + * amd64_inject_section_store
> + *
> + * accept and store error injection section value
> + * range: 0..3
> + * value refers to one of 4 16-byte sections
> + * within a 64-byte cacheline
> + */
> +static ssize_t amd64_inject_section_store(struct mem_ctl_info *mci,
> + const char *data, size_t count)
> +{
> + struct amd64_pvt *pvt = mci->pvt_info;
> + unsigned long value;
> + int rc;
> +
> + rc = strict_strtoul(data, 10, &value);
> + if (rc != -EINVAL) {
> +
> + /* save the 16-byte cache section */
> + pvt->injection.section = (u32) value;
> +
> + return count;
> + }
> + return 0;
> +}
> +
> +/*
> + * amd64_inject_word_store
> + *
> + * accept and store error injection word value
> + * range: 0..8
> + * value refers to one of 9 16-bit word of the 16-byte section
> + * 128-bit + ECC bits
> + */
> +static ssize_t amd64_inject_word_store(struct mem_ctl_info *mci,
> + const char *data, size_t count)
> +{
> + struct amd64_pvt *pvt = mci->pvt_info;
> + unsigned long value;
> + int rc;
> +
> + rc = strict_strtoul(data, 10, &value);
> + if (rc != -EINVAL) {
> +
> + /* save the 16-bit word */
> + value = (value <= 8) ? value : 0;
> + pvt->injection.word = (u32) value;
> +
> + return count;
> + }
> + return 0;
> +}
> +
> +/*
> + * amd64_inject_bit_store
> + *
> + * accept and store error injection hexidecimal bit value
> + * 16-bits of a bit-vector marking which bits to error-out on
> + */
> +static ssize_t amd64_inject_bit_store(struct mem_ctl_info *mci,
> + const char *data, size_t count)
> +{
> + struct amd64_pvt *pvt = mci->pvt_info;
> + unsigned long value;
> + int rc;
> +
> + rc = strict_strtoul(data, 16, &value);
> + if (rc != -EINVAL) {
> +
> + /* save the bit within the 16-bit word */
> + pvt->injection.bit_map = (u32) value & 0xFFFF;
> +
> + return count;
> + }
> + return 0;
> +}
> +
> +/*
> + * amd64_inject_read_store
> + *
> + * READ action. When called, assemble staged values in the pvt
> + * area and format into fields needed by the Injection hardware
> + * Output to hardware and issue a READ operation
> + */
> +static ssize_t amd64_inject_read_store(struct mem_ctl_info *mci,
> + const char *data, size_t count)
> +{
> + struct amd64_pvt *pvt = mci->pvt_info;
> + unsigned long value;
> + u32 section, word_bits;
> + int rc;
> +
> + rc = strict_strtoul(data, 10, &value);
> + if (rc != -EINVAL) {
> +
> + /* Form value to choose 16-byte section of cacheline */
> + section = F10_NB_ARRAY_DRAM_ECC |
> + SET_NB_ARRAY_ADDRESS(pvt->injection.section);
> + pci_write_config_dword(pvt->misc_f3_ctl,
> + F10_NB_ARRAY_ADDR, section);
> +
> + word_bits = SET_NB_DRAM_INJECTION_READ(pvt->injection.word,
> + pvt->injection.bit_map);
> +
> + /* Issue 'word' and 'bit' along with the READ request now */
> + pci_write_config_dword(pvt->misc_f3_ctl,
> + F10_NB_ARRAY_DATA, word_bits);
> +
> + debugf0("%s() section=0x%x word_bits=0x%x\n", __func__,
> + section, word_bits);
> +
> + return count;
> + }
> + return 0;
> +}
> +
> +/*
> + * amd64_inject_write_store
> + *
> + * WRITE action. When called, assemble staged values in the pvt
> + * area and format into fields needed by the Injection hardware
> + * Output to hardware and issue a WRITE operation
> + */
> +static ssize_t amd64_inject_write_store(struct mem_ctl_info *mci,
> + const char *data, size_t count)
> +{
> + struct amd64_pvt *pvt = mci->pvt_info;
> + unsigned long value;
> + u32 section, word_bits;
> + int rc;
> +
> + rc = strict_strtoul(data, 10, &value);
> + if (rc != -EINVAL) {
> +
> + /* Form value to choose 16-byte section of cacheline */
> + section = F10_NB_ARRAY_DRAM_ECC |
> + SET_NB_ARRAY_ADDRESS(pvt->injection.section);
> + pci_write_config_dword(pvt->misc_f3_ctl,
> + F10_NB_ARRAY_ADDR, section);
> +
> + word_bits = SET_NB_DRAM_INJECTION_WRITE(pvt->injection.word,
> + pvt->injection.bit_map);
> +
> + /* Issue 'word' and 'bit' along with the READ request now */
> + pci_write_config_dword(pvt->misc_f3_ctl,
> + F10_NB_ARRAY_DATA, word_bits);
> +
> + debugf0("%s() section=0x%x word_bits=0x%x\n", __func__,
> + section, word_bits);
> +
> + return count;
> + }
> + return 0;
> +}
> +#endif
> +
> +/*
> + * Per MC instance Attribute/Control data control structure
> + * Can add for debug or for normal use
> + */
> +static struct mcidev_sysfs_attribute amd64_mc_sysfs_ctls_attrs[] = {
> +
> +#ifdef CONFIG_EDAC_AMD64_OPTERON_ERROR_INJECTION
> + /* Error injection methods */
> + {
> + .attr = {
> + .name = "z_inject_section",
> + .mode = (S_IRUGO | S_IWUSR)
> + },
> + .show = NULL,
> + .store = amd64_inject_section_store,
> + },
> + {
> + .attr = {
> + .name = "z_inject_word",
> + .mode = (S_IRUGO | S_IWUSR)
> + },
> + .show = NULL,
> + .store = amd64_inject_word_store,
> + },
> + {
> + .attr = {
> + .name = "z_inject_bit_map",
> + .mode = (S_IRUGO | S_IWUSR)
> + },
> + .show = NULL,
> + .store = amd64_inject_bit_store,
> + },
> + {
> + .attr = {
> + .name = "z_inject_write",
> + .mode = (S_IRUGO | S_IWUSR)
> + },
> + .show = NULL,
> + .store = amd64_inject_write_store,
> + },
> + {
> + .attr = {
> + .name = "z_inject_read",
> + .mode = (S_IRUGO | S_IWUSR)
> + },
> + .show = NULL,
> + .store = amd64_inject_read_store,
> + },
> +#endif /* CONFIG_EDAC_AMD64_OPTERON_ERROR_INJECTION */
> +
> +#ifdef CONFIG_EDAC_DEBUG
> + /* RAW register accessors */
> + {
> + .attr = {
> + .name = "zctl_nbea",
> + .mode = (S_IRUGO | S_IWUSR)
> + },
> + .show = amd64_nbea_show,
> + .store = amd64_nbea_store,
> + },
> + {
> + .attr = {
> + .name = "zctl_nbsl",
> + .mode = (S_IRUGO | S_IWUSR)
> + },
> + .show = amd64_nbsl_show,
> + .store = amd64_nbsl_store,
> + },
> + {
> + .attr = {
> + .name = "zctl_nbsh",
> + .mode = (S_IRUGO | S_IWUSR)
> + },
> + .show = amd64_nbsh_show,
> + .store = amd64_nbsh_store,
> + },
> + {
> + .attr = {
> + .name = "zctl_nbcfg",
> + .mode = (S_IRUGO | S_IWUSR)
> + },
> + .show = amd64_nbcfg_show,
> + .store = amd64_nbcfg_store,
> + },
> + {
> + .attr = {
> + .name = "zhw_dhar",
> + .mode = (S_IRUGO)
> + },
> + .show = amd64_dhar_show,
> + .store = NULL,
> + },
> + {
> + .attr = {
> + .name = "zhw_dbam",
> + .mode = (S_IRUGO)
> + },
> + .show = amd64_dbam_show,
> + .store = NULL,
> + },
> + {
> + .attr = {
> + .name = "zhw_topmem",
> + .mode = (S_IRUGO)
> + },
> + .show = amd64_topmem_show,
> + .store = NULL,
> + },
> + {
> + .attr = {
> + .name = "zhw_topmem2",
> + .mode = (S_IRUGO)
> + },
> + .show = amd64_topmem2_show,
> + .store = NULL,
> + },
> + {
> + .attr = {
> + .name = "zhw_hole",
> + .mode = (S_IRUGO)
> + },
> + .show = amd64_hole_show,
> + .store = NULL,
> + },
> +#endif
> + {
> + .attr = { .name = NULL}
> + }
> +};
> +
>
The code looks fine. I agree with Ingo: It is better to move such large
#ifdefs present on patches 19 and 20 into a separate c file.
Cheers,
Mauro.
next prev parent reply other threads:[~2009-05-05 0:08 UTC|newest]
Thread overview: 72+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-04-29 16:54 [RFC PATCH 00/21 v2] amd64_edac: EDAC module for AMD64 Borislav Petkov
2009-04-29 16:54 ` [PATCH 01/21] x86: add methods for writing of an MSR on several CPUs Borislav Petkov
2009-04-29 17:39 ` H. Peter Anvin
2009-05-04 16:46 ` Borislav Petkov
2009-05-04 17:25 ` H. Peter Anvin
2009-05-04 17:53 ` Borislav Petkov
2009-05-04 20:51 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 02/21] amd64_edac: add PCI config register defines Borislav Petkov
2009-05-04 20:54 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 03/21] amd64_edac: add driver structs Borislav Petkov
2009-05-04 20:38 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 04/21] amd64_edac: add memory scrubber interface Borislav Petkov
2009-05-04 21:02 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 05/21] amd64_edac: add sys addr to memory controller mapping helpers Borislav Petkov
2009-05-04 21:08 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 06/21] amd64_edac: add functionality to compute the DRAM hole Borislav Petkov
2009-05-04 21:22 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 07/21] amd64_edac: add DRAM address type conversion facilities Borislav Petkov
2009-05-04 21:39 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 08/21] amd64_edac: add helper to dump relevant registers Borislav Petkov
2009-05-04 21:43 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 09/21] amd64_edac: assign DRAM chip select base and mask in a family-specific way Borislav Petkov
2009-05-04 21:59 ` Mauro Carvalho Chehab
2009-05-05 10:25 ` Borislav Petkov
2009-04-29 16:54 ` [PATCH 10/21] amd64_edac: add k8-specific methods Borislav Petkov
2009-05-04 22:06 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 11/21] amd64_edac: add f10-and-later methods-p1 Borislav Petkov
2009-05-04 22:10 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 12/21] amd64_edac: add f10-and-later methods-p2 Borislav Petkov
2009-05-04 23:25 ` Mauro Carvalho Chehab
2009-04-29 16:54 ` [PATCH 13/21] amd64_edac: add f10-and-later methods-p3 Borislav Petkov
2009-04-29 18:22 ` Ingo Molnar
2009-04-29 18:24 ` Ingo Molnar
2009-04-29 19:05 ` Andrew Morton
2009-04-29 19:23 ` Ingo Molnar
2009-04-29 19:42 ` Andrew Morton
2009-04-29 19:53 ` Ingo Molnar
2009-04-29 20:47 ` Ingo Molnar
2009-04-30 10:01 ` Borislav Petkov
2009-04-30 10:42 ` Ingo Molnar
2009-05-04 23:36 ` Mauro Carvalho Chehab
2009-04-29 16:55 ` [PATCH 14/21] amd64_edac: add per-family descriptors Borislav Petkov
2009-05-04 23:39 ` Mauro Carvalho Chehab
2009-04-29 16:55 ` [PATCH 15/21] amd64_edac: add ECC chipkill syndrome mapping table Borislav Petkov
2009-05-04 23:42 ` Mauro Carvalho Chehab
2009-04-29 16:55 ` [PATCH 16/21] amd64_edac: add error decoding logic Borislav Petkov
2009-04-29 18:19 ` Ingo Molnar
2009-05-04 23:48 ` Mauro Carvalho Chehab
2009-04-29 16:55 ` [PATCH 17/21] amd64_edac: add EDAC core-related initializers Borislav Petkov
2009-05-04 23:53 ` Mauro Carvalho Chehab
2009-04-29 16:55 ` [PATCH 18/21] amd64_edac: add ECC reporting initializers Borislav Petkov
2009-05-04 23:59 ` Mauro Carvalho Chehab
2009-04-29 16:55 ` [PATCH 19/21] amd64_edac: add debugging/testing code Borislav Petkov
2009-04-29 18:18 ` Ingo Molnar
2009-04-29 16:55 ` [PATCH 20/21] amd64_edac: add DRAM error injection logic using sysfs Borislav Petkov
2009-04-29 18:17 ` Ingo Molnar
2009-05-05 0:06 ` Mauro Carvalho Chehab [this message]
2009-04-29 16:55 ` [PATCH 21/21] amd64_edac: add module registration routines Borislav Petkov
2009-05-05 0:10 ` Mauro Carvalho Chehab
2009-04-29 19:30 ` [RFC PATCH 00/21 v2] amd64_edac: EDAC module for AMD64 Andi Kleen
2009-04-30 11:57 ` Borislav Petkov
2009-04-30 12:21 ` Ingo Molnar
2009-04-30 12:47 ` Andi Kleen
2009-04-30 14:48 ` Aristeu Rozanski
2009-05-01 7:53 ` Borislav Petkov
2009-05-03 0:32 ` Aristeu Rozanski
2009-04-30 18:37 ` Mauro Carvalho Chehab
2009-05-01 12:39 ` Ingo Molnar
-- strict thread matches above, loose matches on Subject: below --
2009-04-30 13:55 [PATCH 20/21] amd64_edac: add DRAM error injection logic using sysfs Doug Thompson
2009-04-30 6:28 Doug Thompson
2009-04-30 8:34 ` Ingo Molnar
2009-04-28 15:05 [RFC PATCH 00/21] amd64_edac: EDAC module for AMD64 Borislav Petkov
2009-04-28 15:06 ` [PATCH 20/21] amd64_edac: add DRAM error injection logic using sysfs Borislav Petkov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=49FF831B.4030302@redhat.com \
--to=mchehab@redhat.com \
--cc=akpm@linux-foundation.org \
--cc=borislav.petkov@amd.com \
--cc=dougthompson@xmission.com \
--cc=greg@kroah.com \
--cc=hpa@zytor.com \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@elte.hu \
--cc=tglx@linutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox