~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/Documentation/firmware-guide/acpi/apei/einj.rst

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /Documentation/firmware-guide/acpi/apei/einj.rst (Architecture m68k) and /Documentation/firmware-guide/acpi/apei/einj.rst (Architecture ppc)


  1 .. SPDX-License-Identifier: GPL-2.0                 1 .. SPDX-License-Identifier: GPL-2.0
  2                                                     2 
  3 ====================                                3 ====================
  4 APEI Error INJection                                4 APEI Error INJection
  5 ====================                                5 ====================
  6                                                     6 
  7 EINJ provides a hardware error injection mecha      7 EINJ provides a hardware error injection mechanism. It is very useful
  8 for debugging and testing APEI and RAS feature      8 for debugging and testing APEI and RAS features in general.
  9                                                     9 
 10 You need to check whether your BIOS supports E     10 You need to check whether your BIOS supports EINJ first. For that, look
 11 for early boot messages similar to this one::      11 for early boot messages similar to this one::
 12                                                    12 
 13   ACPI: EINJ 0x000000007370A000 000150 (v01 IN     13   ACPI: EINJ 0x000000007370A000 000150 (v01 INTEL           00000001 INTL 00000001)
 14                                                    14 
 15 which shows that the BIOS is exposing an EINJ      15 which shows that the BIOS is exposing an EINJ table - it is the
 16 mechanism through which the injection is done.     16 mechanism through which the injection is done.
 17                                                    17 
 18 Alternatively, look in /sys/firmware/acpi/tabl     18 Alternatively, look in /sys/firmware/acpi/tables for an "EINJ" file,
 19 which is a different representation of the sam     19 which is a different representation of the same thing.
 20                                                    20 
 21 It doesn't necessarily mean that EINJ is not s     21 It doesn't necessarily mean that EINJ is not supported if those above
 22 don't exist: before you give up, go into BIOS      22 don't exist: before you give up, go into BIOS setup to see if the BIOS
 23 has an option to enable error injection. Look      23 has an option to enable error injection. Look for something called WHEA
 24 or similar. Often, you need to enable an ACPI5     24 or similar. Often, you need to enable an ACPI5 support option prior, in
 25 order to see the APEI,EINJ,... functionality s     25 order to see the APEI,EINJ,... functionality supported and exposed by
 26 the BIOS menu.                                     26 the BIOS menu.
 27                                                    27 
 28 To use EINJ, make sure the following are optio     28 To use EINJ, make sure the following are options enabled in your kernel
 29 configuration::                                    29 configuration::
 30                                                    30 
 31   CONFIG_DEBUG_FS                                  31   CONFIG_DEBUG_FS
 32   CONFIG_ACPI_APEI                                 32   CONFIG_ACPI_APEI
 33   CONFIG_ACPI_APEI_EINJ                            33   CONFIG_ACPI_APEI_EINJ
 34                                                    34 
 35 ...and to (optionally) enable CXL protocol err     35 ...and to (optionally) enable CXL protocol error injection set::
 36                                                    36 
 37   CONFIG_ACPI_APEI_EINJ_CXL                        37   CONFIG_ACPI_APEI_EINJ_CXL
 38                                                    38 
 39 The EINJ user interface is in <debugfs mount p     39 The EINJ user interface is in <debugfs mount point>/apei/einj.
 40                                                    40 
 41 The following files belong to it:                  41 The following files belong to it:
 42                                                    42 
 43 - available_error_type                             43 - available_error_type
 44                                                    44 
 45   This file shows which error types are suppor     45   This file shows which error types are supported:
 46                                                    46 
 47   ================  ==========================     47   ================  ===================================
 48   Error Type Value      Error Description          48   Error Type Value      Error Description
 49   ================  ==========================     49   ================  ===================================
 50   0x00000001        Processor Correctable          50   0x00000001        Processor Correctable
 51   0x00000002        Processor Uncorrectable no     51   0x00000002        Processor Uncorrectable non-fatal
 52   0x00000004        Processor Uncorrectable fa     52   0x00000004        Processor Uncorrectable fatal
 53   0x00000008        Memory Correctable             53   0x00000008        Memory Correctable
 54   0x00000010        Memory Uncorrectable non-f     54   0x00000010        Memory Uncorrectable non-fatal
 55   0x00000020        Memory Uncorrectable fatal     55   0x00000020        Memory Uncorrectable fatal
 56   0x00000040        PCI Express Correctable        56   0x00000040        PCI Express Correctable
 57   0x00000080        PCI Express Uncorrectable      57   0x00000080        PCI Express Uncorrectable non-fatal
 58   0x00000100        PCI Express Uncorrectable      58   0x00000100        PCI Express Uncorrectable fatal
 59   0x00000200        Platform Correctable           59   0x00000200        Platform Correctable
 60   0x00000400        Platform Uncorrectable non     60   0x00000400        Platform Uncorrectable non-fatal
 61   0x00000800        Platform Uncorrectable fat     61   0x00000800        Platform Uncorrectable fatal
 62   ================  ==========================     62   ================  ===================================
 63                                                    63 
 64   The format of the file contents are as above     64   The format of the file contents are as above, except present are only
 65   the available error types.                       65   the available error types.
 66                                                    66 
 67 - error_type                                       67 - error_type
 68                                                    68 
 69   Set the value of the error type being inject     69   Set the value of the error type being injected. Possible error types
 70   are defined in the file available_error_type     70   are defined in the file available_error_type above.
 71                                                    71 
 72 - error_inject                                     72 - error_inject
 73                                                    73 
 74   Write any integer to this file to trigger th     74   Write any integer to this file to trigger the error injection. Make
 75   sure you have specified all necessary error      75   sure you have specified all necessary error parameters, i.e. this
 76   write should be the last step when injecting     76   write should be the last step when injecting errors.
 77                                                    77 
 78 - flags                                            78 - flags
 79                                                    79 
 80   Present for kernel versions 3.13 and above.      80   Present for kernel versions 3.13 and above. Used to specify which
 81   of param{1..4} are valid and should be used      81   of param{1..4} are valid and should be used by the firmware during
 82   injection. Value is a bitmask as specified i     82   injection. Value is a bitmask as specified in ACPI5.0 spec for the
 83   SET_ERROR_TYPE_WITH_ADDRESS data structure:      83   SET_ERROR_TYPE_WITH_ADDRESS data structure:
 84                                                    84 
 85     Bit 0                                          85     Bit 0
 86       Processor APIC field valid (see param3 b     86       Processor APIC field valid (see param3 below).
 87     Bit 1                                          87     Bit 1
 88       Memory address and mask valid (param1 an     88       Memory address and mask valid (param1 and param2).
 89     Bit 2                                          89     Bit 2
 90       PCIe (seg,bus,dev,fn) valid (see param4      90       PCIe (seg,bus,dev,fn) valid (see param4 below).
 91                                                    91 
 92   If set to zero, legacy behavior is mimicked      92   If set to zero, legacy behavior is mimicked where the type of
 93   injection specifies just one bit set, and pa     93   injection specifies just one bit set, and param1 is multiplexed.
 94                                                    94 
 95 - param1                                           95 - param1
 96                                                    96 
 97   This file is used to set the first error par     97   This file is used to set the first error parameter value. Its effect
 98   depends on the error type specified in error     98   depends on the error type specified in error_type. For example, if
 99   error type is memory related type, the param     99   error type is memory related type, the param1 should be a valid
100   physical memory address. [Unless "flag" is s    100   physical memory address. [Unless "flag" is set - see above]
101                                                   101 
102 - param2                                          102 - param2
103                                                   103 
104   Same use as param1 above. For example, if er    104   Same use as param1 above. For example, if error type is of memory
105   related type, then param2 should be a physic    105   related type, then param2 should be a physical memory address mask.
106   Linux requires page or narrower granularity,    106   Linux requires page or narrower granularity, say, 0xfffffffffffff000.
107                                                   107 
108 - param3                                          108 - param3
109                                                   109 
110   Used when the 0x1 bit is set in "flags" to s    110   Used when the 0x1 bit is set in "flags" to specify the APIC id
111                                                   111 
112 - param4                                          112 - param4
113   Used when the 0x4 bit is set in "flags" to s    113   Used when the 0x4 bit is set in "flags" to specify target PCIe device
114                                                   114 
115 - notrigger                                       115 - notrigger
116                                                   116 
117   The error injection mechanism is a two-step     117   The error injection mechanism is a two-step process. First inject the
118   error, then perform some actions to trigger     118   error, then perform some actions to trigger it. Setting "notrigger"
119   to 1 skips the trigger phase, which *may* al    119   to 1 skips the trigger phase, which *may* allow the user to cause the
120   error in some other context by a simple acce    120   error in some other context by a simple access to the CPU, memory
121   location, or device that is the target of th    121   location, or device that is the target of the error injection. Whether
122   this actually works depends on what operatio    122   this actually works depends on what operations the BIOS actually
123   includes in the trigger phase.                  123   includes in the trigger phase.
124                                                   124 
125 CXL error types are supported from ACPI 6.5 on    125 CXL error types are supported from ACPI 6.5 onwards (given a CXL port
126 is present). The EINJ user interface for CXL e    126 is present). The EINJ user interface for CXL error types is at
127 <debugfs mount point>/cxl. The following files    127 <debugfs mount point>/cxl. The following files belong to it:
128                                                   128 
129 - einj_types:                                     129 - einj_types:
130                                                   130 
131   Provides the same functionality as available    131   Provides the same functionality as available_error_types above, but
132   for CXL error types                             132   for CXL error types
133                                                   133 
134 - $dport_dev/einj_inject:                         134 - $dport_dev/einj_inject:
135                                                   135 
136   Injects a CXL error type into the CXL port r    136   Injects a CXL error type into the CXL port represented by $dport_dev,
137   where $dport_dev is the name of the CXL port    137   where $dport_dev is the name of the CXL port (usually a PCIe device name).
138   Error injections targeting a CXL 2.0+ port c    138   Error injections targeting a CXL 2.0+ port can use the legacy interface
139   under <debugfs mount point>/apei/einj, while    139   under <debugfs mount point>/apei/einj, while CXL 1.1/1.0 port injections
140   must use this file.                             140   must use this file.
141                                                   141 
142                                                   142 
143 BIOS versions based on the ACPI 4.0 specificat    143 BIOS versions based on the ACPI 4.0 specification have limited options
144 in controlling where the errors are injected.     144 in controlling where the errors are injected. Your BIOS may support an
145 extension (enabled with the param_extension=1     145 extension (enabled with the param_extension=1 module parameter, or boot
146 command line einj.param_extension=1). This all    146 command line einj.param_extension=1). This allows the address and mask
147 for memory injections to be specified by the p    147 for memory injections to be specified by the param1 and param2 files in
148 apei/einj.                                        148 apei/einj.
149                                                   149 
150 BIOS versions based on the ACPI 5.0 specificat    150 BIOS versions based on the ACPI 5.0 specification have more control over
151 the target of the injection. For processor-rel    151 the target of the injection. For processor-related errors (type 0x1, 0x2
152 and 0x4), you can set flags to 0x3 (param3 for    152 and 0x4), you can set flags to 0x3 (param3 for bit 0, and param1 and
153 param2 for bit 1) so that you have more inform    153 param2 for bit 1) so that you have more information added to the error
154 signature being injected. The actual data pass    154 signature being injected. The actual data passed is this::
155                                                   155 
156         memory_address = param1;                  156         memory_address = param1;
157         memory_address_range = param2;            157         memory_address_range = param2;
158         apicid = param3;                          158         apicid = param3;
159         pcie_sbdf = param4;                       159         pcie_sbdf = param4;
160                                                   160 
161 For memory errors (type 0x8, 0x10 and 0x20) th    161 For memory errors (type 0x8, 0x10 and 0x20) the address is set using
162 param1 with a mask in param2 (0x0 is equivalen    162 param1 with a mask in param2 (0x0 is equivalent to all ones). For PCI
163 express errors (type 0x40, 0x80 and 0x100) the    163 express errors (type 0x40, 0x80 and 0x100) the segment, bus, device and
164 function are specified using param1::             164 function are specified using param1::
165                                                   165 
166          31     24 23    16 15    11 10      8    166          31     24 23    16 15    11 10      8  7        0
167         +-------------------------------------    167         +-------------------------------------------------+
168         | segment |   bus  | device | function    168         | segment |   bus  | device | function | reserved |
169         +-------------------------------------    169         +-------------------------------------------------+
170                                                   170 
171 Anyway, you get the idea, if there's doubt jus    171 Anyway, you get the idea, if there's doubt just take a look at the code
172 in drivers/acpi/apei/einj.c.                      172 in drivers/acpi/apei/einj.c.
173                                                   173 
174 An ACPI 5.0 BIOS may also allow vendor-specifi    174 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected.
175 In this case a file named vendor will contain     175 In this case a file named vendor will contain identifying information
176 from the BIOS that hopefully will allow an app    176 from the BIOS that hopefully will allow an application wishing to use
177 the vendor-specific extension to tell that the    177 the vendor-specific extension to tell that they are running on a BIOS
178 that supports it. All vendor extensions have t    178 that supports it. All vendor extensions have the 0x80000000 bit set in
179 error_type. A file vendor_flags controls the i    179 error_type. A file vendor_flags controls the interpretation of param1
180 and param2 (1 = PROCESSOR, 2 = MEMORY, 4 = PCI    180 and param2 (1 = PROCESSOR, 2 = MEMORY, 4 = PCI). See your BIOS vendor
181 documentation for details (and expect changes     181 documentation for details (and expect changes to this API if vendors
182 creativity in using this feature expands beyon    182 creativity in using this feature expands beyond our expectations).
183                                                   183 
184                                                   184 
185 An error injection example::                      185 An error injection example::
186                                                   186 
187   # cd /sys/kernel/debug/apei/einj                187   # cd /sys/kernel/debug/apei/einj
188   # cat available_error_type            # See     188   # cat available_error_type            # See which errors can be injected
189   0x00000002    Processor Uncorrectable non-fa    189   0x00000002    Processor Uncorrectable non-fatal
190   0x00000008    Memory Correctable                190   0x00000008    Memory Correctable
191   0x00000010    Memory Uncorrectable non-fatal    191   0x00000010    Memory Uncorrectable non-fatal
192   # echo 0x12345000 > param1            # Set     192   # echo 0x12345000 > param1            # Set memory address for injection
193   # echo 0xfffffffffffff000 > param2              193   # echo 0xfffffffffffff000 > param2            # Mask - anywhere in this page
194   # echo 0x8 > error_type                         194   # echo 0x8 > error_type                       # Choose correctable memory error
195   # echo 1 > error_inject                         195   # echo 1 > error_inject                       # Inject now
196                                                   196 
197 You should see something like this in dmesg::     197 You should see something like this in dmesg::
198                                                   198 
199   [22715.830801] EDAC sbridge MC3: HANDLING MC    199   [22715.830801] EDAC sbridge MC3: HANDLING MCE MEMORY ERROR
200   [22715.834759] EDAC sbridge MC3: CPU 0: Mach    200   [22715.834759] EDAC sbridge MC3: CPU 0: Machine Check Event: 0 Bank 7: 8c00004000010090
201   [22715.834759] EDAC sbridge MC3: TSC 0          201   [22715.834759] EDAC sbridge MC3: TSC 0
202   [22715.834759] EDAC sbridge MC3: ADDR 123450    202   [22715.834759] EDAC sbridge MC3: ADDR 12345000 EDAC sbridge MC3: MISC 144780c86
203   [22715.834759] EDAC sbridge MC3: PROCESSOR 0    203   [22715.834759] EDAC sbridge MC3: PROCESSOR 0:306e7 TIME 1422553404 SOCKET 0 APIC 0
204   [22716.616173] EDAC MC3: 1 CE memory read er    204   [22716.616173] EDAC MC3: 1 CE memory read error on CPU_SrcID#0_Channel#0_DIMM#0 (channel:0 slot:0 page:0x12345 offset:0x0 grain:32 syndrome:0x0 -  area:DRAM err_code:0001:0090 socket:0 channel_mask:1 rank:0)
205                                                   205 
206 A CXL error injection example with $dport_dev=    206 A CXL error injection example with $dport_dev=0000:e0:01.1::
207                                                   207 
208     # cd /sys/kernel/debug/cxl/                   208     # cd /sys/kernel/debug/cxl/
209     # ls                                          209     # ls
210     0000:e0:01.1 0000:0c:00.0                     210     0000:e0:01.1 0000:0c:00.0
211     # cat einj_types                # See whic    211     # cat einj_types                # See which errors can be injected
212         0x00008000  CXL.mem Protocol Correctab    212         0x00008000  CXL.mem Protocol Correctable
213         0x00010000  CXL.mem Protocol Uncorrect    213         0x00010000  CXL.mem Protocol Uncorrectable non-fatal
214         0x00020000  CXL.mem Protocol Uncorrect    214         0x00020000  CXL.mem Protocol Uncorrectable fatal
215     # cd 0000:e0:01.1               # Navigate    215     # cd 0000:e0:01.1               # Navigate to dport to inject into
216     # echo 0x8000 > einj_inject     # Inject e    216     # echo 0x8000 > einj_inject     # Inject error
217                                                   217 
218 Special notes for injection into SGX enclaves:    218 Special notes for injection into SGX enclaves:
219                                                   219 
220 There may be a separate BIOS setup option to e    220 There may be a separate BIOS setup option to enable SGX injection.
221                                                   221 
222 The injection process consists of setting some    222 The injection process consists of setting some special memory controller
223 trigger that will inject the error on the next    223 trigger that will inject the error on the next write to the target
224 address. But the h/w prevents any software out    224 address. But the h/w prevents any software outside of an SGX enclave
225 from accessing enclave pages (even BIOS SMM mo    225 from accessing enclave pages (even BIOS SMM mode).
226                                                   226 
227 The following sequence can be used:               227 The following sequence can be used:
228   1) Determine physical address of enclave pag    228   1) Determine physical address of enclave page
229   2) Use "notrigger=1" mode to inject (this wi    229   2) Use "notrigger=1" mode to inject (this will setup
230      the injection address, but will not actua    230      the injection address, but will not actually inject)
231   3) Enter the enclave                            231   3) Enter the enclave
232   4) Store data to the virtual address matchin    232   4) Store data to the virtual address matching physical address from step 1
233   5) Execute CLFLUSH for that virtual address     233   5) Execute CLFLUSH for that virtual address
234   6) Spin delay for 250ms                         234   6) Spin delay for 250ms
235   7) Read from the virtual address. This will     235   7) Read from the virtual address. This will trigger the error
236                                                   236 
237 For more information about EINJ, please refer     237 For more information about EINJ, please refer to ACPI specification
238 version 4.0, section 17.5 and ACPI 5.0, sectio    238 version 4.0, section 17.5 and ACPI 5.0, section 18.6.
                                                      

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php