| // SPDX-License-Identifier: GPL-2.0 | 
 |  | 
 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt | 
 |  | 
 | #include <linux/init.h> | 
 | #include <linux/sched.h> | 
 | #include <linux/kthread.h> | 
 | #include <linux/workqueue.h> | 
 | #include <linux/memblock.h> | 
 |  | 
 | #include <asm/proto.h> | 
 | #include <asm/setup.h> | 
 |  | 
 | /* | 
 |  * Some BIOSes seem to corrupt the low 64k of memory during events | 
 |  * like suspend/resume and unplugging an HDMI cable.  Reserve all | 
 |  * remaining free memory in that area and fill it with a distinct | 
 |  * pattern. | 
 |  */ | 
 | #define MAX_SCAN_AREAS	8 | 
 |  | 
 | static int __read_mostly memory_corruption_check = -1; | 
 |  | 
 | static unsigned __read_mostly corruption_check_size = 64*1024; | 
 | static unsigned __read_mostly corruption_check_period = 60; /* seconds */ | 
 |  | 
 | static struct scan_area { | 
 | 	u64 addr; | 
 | 	u64 size; | 
 | } scan_areas[MAX_SCAN_AREAS]; | 
 | static int num_scan_areas; | 
 |  | 
 | static __init int set_corruption_check(char *arg) | 
 | { | 
 | 	ssize_t ret; | 
 | 	unsigned long val; | 
 |  | 
 | 	if (!arg) { | 
 | 		pr_err("memory_corruption_check config string not provided\n"); | 
 | 		return -EINVAL; | 
 | 	} | 
 |  | 
 | 	ret = kstrtoul(arg, 10, &val); | 
 | 	if (ret) | 
 | 		return ret; | 
 |  | 
 | 	memory_corruption_check = val; | 
 |  | 
 | 	return 0; | 
 | } | 
 | early_param("memory_corruption_check", set_corruption_check); | 
 |  | 
 | static __init int set_corruption_check_period(char *arg) | 
 | { | 
 | 	ssize_t ret; | 
 | 	unsigned long val; | 
 |  | 
 | 	if (!arg) { | 
 | 		pr_err("memory_corruption_check_period config string not provided\n"); | 
 | 		return -EINVAL; | 
 | 	} | 
 |  | 
 | 	ret = kstrtoul(arg, 10, &val); | 
 | 	if (ret) | 
 | 		return ret; | 
 |  | 
 | 	corruption_check_period = val; | 
 | 	return 0; | 
 | } | 
 | early_param("memory_corruption_check_period", set_corruption_check_period); | 
 |  | 
 | static __init int set_corruption_check_size(char *arg) | 
 | { | 
 | 	char *end; | 
 | 	unsigned size; | 
 |  | 
 | 	if (!arg) { | 
 | 		pr_err("memory_corruption_check_size config string not provided\n"); | 
 | 		return -EINVAL; | 
 | 	} | 
 |  | 
 | 	size = memparse(arg, &end); | 
 |  | 
 | 	if (*end == '\0') | 
 | 		corruption_check_size = size; | 
 |  | 
 | 	return (size == corruption_check_size) ? 0 : -EINVAL; | 
 | } | 
 | early_param("memory_corruption_check_size", set_corruption_check_size); | 
 |  | 
 |  | 
 | void __init setup_bios_corruption_check(void) | 
 | { | 
 | 	phys_addr_t start, end; | 
 | 	u64 i; | 
 |  | 
 | 	if (memory_corruption_check == -1) { | 
 | 		memory_corruption_check = | 
 | #ifdef CONFIG_X86_BOOTPARAM_MEMORY_CORRUPTION_CHECK | 
 | 			1 | 
 | #else | 
 | 			0 | 
 | #endif | 
 | 			; | 
 | 	} | 
 |  | 
 | 	if (corruption_check_size == 0) | 
 | 		memory_corruption_check = 0; | 
 |  | 
 | 	if (!memory_corruption_check) | 
 | 		return; | 
 |  | 
 | 	corruption_check_size = round_up(corruption_check_size, PAGE_SIZE); | 
 |  | 
 | 	for_each_free_mem_range(i, NUMA_NO_NODE, MEMBLOCK_NONE, &start, &end, | 
 | 				NULL) { | 
 | 		start = clamp_t(phys_addr_t, round_up(start, PAGE_SIZE), | 
 | 				PAGE_SIZE, corruption_check_size); | 
 | 		end = clamp_t(phys_addr_t, round_down(end, PAGE_SIZE), | 
 | 			      PAGE_SIZE, corruption_check_size); | 
 | 		if (start >= end) | 
 | 			continue; | 
 |  | 
 | 		memblock_reserve(start, end - start); | 
 | 		scan_areas[num_scan_areas].addr = start; | 
 | 		scan_areas[num_scan_areas].size = end - start; | 
 |  | 
 | 		/* Assume we've already mapped this early memory */ | 
 | 		memset(__va(start), 0, end - start); | 
 |  | 
 | 		if (++num_scan_areas >= MAX_SCAN_AREAS) | 
 | 			break; | 
 | 	} | 
 |  | 
 | 	if (num_scan_areas) | 
 | 		pr_info("Scanning %d areas for low memory corruption\n", num_scan_areas); | 
 | } | 
 |  | 
 |  | 
 | static void check_for_bios_corruption(void) | 
 | { | 
 | 	int i; | 
 | 	int corruption = 0; | 
 |  | 
 | 	if (!memory_corruption_check) | 
 | 		return; | 
 |  | 
 | 	for (i = 0; i < num_scan_areas; i++) { | 
 | 		unsigned long *addr = __va(scan_areas[i].addr); | 
 | 		unsigned long size = scan_areas[i].size; | 
 |  | 
 | 		for (; size; addr++, size -= sizeof(unsigned long)) { | 
 | 			if (!*addr) | 
 | 				continue; | 
 | 			pr_err("Corrupted low memory at %p (%lx phys) = %08lx\n", addr, __pa(addr), *addr); | 
 | 			corruption = 1; | 
 | 			*addr = 0; | 
 | 		} | 
 | 	} | 
 |  | 
 | 	WARN_ONCE(corruption, KERN_ERR "Memory corruption detected in low memory\n"); | 
 | } | 
 |  | 
 | static void check_corruption(struct work_struct *dummy); | 
 | static DECLARE_DELAYED_WORK(bios_check_work, check_corruption); | 
 |  | 
 | static void check_corruption(struct work_struct *dummy) | 
 | { | 
 | 	check_for_bios_corruption(); | 
 | 	schedule_delayed_work(&bios_check_work, | 
 | 		round_jiffies_relative(corruption_check_period*HZ)); | 
 | } | 
 |  | 
 | static int start_periodic_check_for_corruption(void) | 
 | { | 
 | 	if (!num_scan_areas || !memory_corruption_check || corruption_check_period == 0) | 
 | 		return 0; | 
 |  | 
 | 	pr_info("Scanning for low memory corruption every %d seconds\n", corruption_check_period); | 
 |  | 
 | 	/* First time we run the checks right away */ | 
 | 	schedule_delayed_work(&bios_check_work, 0); | 
 |  | 
 | 	return 0; | 
 | } | 
 | device_initcall(start_periodic_check_for_corruption); | 
 |  |