1 .. SPDX-License-Identifier: GPL-2.0
7 EINJ provides a hardware error injection mechanism. It is very useful
8 for debugging and testing APEI and RAS features in general.
10 You need to check whether your BIOS supports EINJ first. For that, look
11 for early boot messages similar to this one::
13 ACPI: EINJ 0x000000007370A000 000150 (v01 INTEL 00000001 INTL 00000001)
15 which shows that the BIOS is exposing an EINJ table - it is the
16 mechanism through which the injection is done.
18 Alternatively, look in /sys/firmware/acpi/tables for an "EINJ" file,
19 which is a different representation of the same thing.
21 It doesn't necessarily mean that EINJ is not supported if those above
22 don't exist: before you give up, go into BIOS setup to see if the BIOS
23 has an option to enable error injection. Look for something called WHEA
24 or similar. Often, you need to enable an ACPI5 support option prior, in
25 order to see the APEI,EINJ,... functionality supported and exposed by
28 To use EINJ, make sure the following are options enabled in your kernel
35 ...and to (optionally) enable CXL protocol error injection set::
37 CONFIG_ACPI_APEI_EINJ_CXL
39 The EINJ user interface is in <debugfs mount point>/apei/einj.
41 The following files belong to it:
43 - available_error_type
45 This file shows which error types are supported:
47 ================ ===================================
48 Error Type Value Error Description
49 ================ ===================================
50 0x00000001 Processor Correctable
51 0x00000002 Processor Uncorrectable non-fatal
52 0x00000004 Processor Uncorrectable fatal
53 0x00000008 Memory Correctable
54 0x00000010 Memory Uncorrectable non-fatal
55 0x00000020 Memory Uncorrectable fatal
56 0x00000040 PCI Express Correctable
57 0x00000080 PCI Express Uncorrectable non-fatal
58 0x00000100 PCI Express Uncorrectable fatal
59 0x00000200 Platform Correctable
60 0x00000400 Platform Uncorrectable non-fatal
61 0x00000800 Platform Uncorrectable fatal
62 ================ ===================================
64 The format of the file contents are as above, except present are only
65 the available error types.
69 Set the value of the error type being injected. Possible error types
70 are defined in the file available_error_type above.
74 Write any integer to this file to trigger the error injection. Make
75 sure you have specified all necessary error parameters, i.e. this
76 write should be the last step when injecting errors.
80 Present for kernel versions 3.13 and above. Used to specify which
81 of param{1..4} are valid and should be used by the firmware during
82 injection. Value is a bitmask as specified in ACPI5.0 spec for the
83 SET_ERROR_TYPE_WITH_ADDRESS data structure:
86 Processor APIC field valid (see param3 below).
88 Memory address and mask valid (param1 and param2).
90 PCIe (seg,bus,dev,fn) valid (see param4 below).
92 If set to zero, legacy behavior is mimicked where the type of
93 injection specifies just one bit set, and param1 is multiplexed.
97 This file is used to set the first error parameter value. Its effect
98 depends on the error type specified in error_type. For example, if
99 error type is memory related type, the param1 should be a valid
100 physical memory address. [Unless "flag" is set - see above]
104 Same use as param1 above. For example, if error type is of memory
105 related type, then param2 should be a physical memory address mask.
106 Linux requires page or narrower granularity, say, 0xfffffffffffff000.
110 Used when the 0x1 bit is set in "flags" to specify the APIC id
113 Used when the 0x4 bit is set in "flags" to specify target PCIe device
117 The error injection mechanism is a two-step process. First inject the
118 error, then perform some actions to trigger it. Setting "notrigger"
119 to 1 skips the trigger phase, which *may* allow the user to cause the
120 error in some other context by a simple access to the CPU, memory
121 location, or device that is the target of the error injection. Whether
122 this actually works depends on what operations the BIOS actually
123 includes in the trigger phase.
125 CXL error types are supported from ACPI 6.5 onwards (given a CXL port
126 is present). The EINJ user interface for CXL error types is at
127 <debugfs mount point>/cxl. The following files belong to it:
131 Provides the same functionality as available_error_types above, but
134 - $dport_dev/einj_inject:
136 Injects a CXL error type into the CXL port represented by $dport_dev,
137 where $dport_dev is the name of the CXL port (usually a PCIe device name).
138 Error injections targeting a CXL 2.0+ port can use the legacy interface
139 under <debugfs mount point>/apei/einj, while CXL 1.1/1.0 port injections
143 BIOS versions based on the ACPI 4.0 specification have limited options
144 in controlling where the errors are injected. Your BIOS may support an
145 extension (enabled with the param_extension=1 module parameter, or boot
146 command line einj.param_extension=1). This allows the address and mask
147 for memory injections to be specified by the param1 and param2 files in
150 BIOS versions based on the ACPI 5.0 specification have more control over
151 the target of the injection. For processor-related errors (type 0x1, 0x2
152 and 0x4), you can set flags to 0x3 (param3 for bit 0, and param1 and
153 param2 for bit 1) so that you have more information added to the error
154 signature being injected. The actual data passed is this::
156 memory_address = param1;
157 memory_address_range = param2;
161 For memory errors (type 0x8, 0x10 and 0x20) the address is set using
162 param1 with a mask in param2 (0x0 is equivalent to all ones). For PCI
163 express errors (type 0x40, 0x80 and 0x100) the segment, bus, device and
164 function are specified using param1::
166 31 24 23 16 15 11 10 8 7 0
167 +-------------------------------------------------+
168 | segment | bus | device | function | reserved |
169 +-------------------------------------------------+
171 Anyway, you get the idea, if there's doubt just take a look at the code
172 in drivers/acpi/apei/einj.c.
174 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected.
175 In this case a file named vendor will contain identifying information
176 from the BIOS that hopefully will allow an application wishing to use
177 the vendor-specific extension to tell that they are running on a BIOS
178 that supports it. All vendor extensions have the 0x80000000 bit set in
179 error_type. A file vendor_flags controls the interpretation of param1
180 and param2 (1 = PROCESSOR, 2 = MEMORY, 4 = PCI). See your BIOS vendor
181 documentation for details (and expect changes to this API if vendors
182 creativity in using this feature expands beyond our expectations).
185 An error injection example::
187 # cd /sys/kernel/debug/apei/einj
188 # cat available_error_type # See which errors can be injected
189 0x00000002 Processor Uncorrectable non-fatal
190 0x00000008 Memory Correctable
191 0x00000010 Memory Uncorrectable non-fatal
192 # echo 0x12345000 > param1 # Set memory address for injection
193 # echo 0xfffffffffffff000 > param2 # Mask - anywhere in this page
194 # echo 0x8 > error_type # Choose correctable memory error
195 # echo 1 > error_inject # Inject now
197 You should see something like this in dmesg::
199 [22715.830801] EDAC sbridge MC3: HANDLING MCE MEMORY ERROR
200 [22715.834759] EDAC sbridge MC3: CPU 0: Machine Check Event: 0 Bank 7: 8c00004000010090
201 [22715.834759] EDAC sbridge MC3: TSC 0
202 [22715.834759] EDAC sbridge MC3: ADDR 12345000 EDAC sbridge MC3: MISC 144780c86
203 [22715.834759] EDAC sbridge MC3: PROCESSOR 0:306e7 TIME 1422553404 SOCKET 0 APIC 0
204 [22716.616173] EDAC MC3: 1 CE memory read error on CPU_SrcID#0_Channel#0_DIMM#0 (channel:0 slot:0 page:0x12345 offset:0x0 grain:32 syndrome:0x0 - area:DRAM err_code:0001:0090 socket:0 channel_mask:1 rank:0)
206 A CXL error injection example with $dport_dev=0000:e0:01.1::
208 # cd /sys/kernel/debug/cxl/
210 0000:e0:01.1 0000:0c:00.0
211 # cat einj_types # See which errors can be injected
212 0x00008000 CXL.mem Protocol Correctable
213 0x00010000 CXL.mem Protocol Uncorrectable non-fatal
214 0x00020000 CXL.mem Protocol Uncorrectable fatal
215 # cd 0000:e0:01.1 # Navigate to dport to inject into
216 # echo 0x8000 > einj_inject # Inject error
218 Special notes for injection into SGX enclaves:
220 There may be a separate BIOS setup option to enable SGX injection.
222 The injection process consists of setting some special memory controller
223 trigger that will inject the error on the next write to the target
224 address. But the h/w prevents any software outside of an SGX enclave
225 from accessing enclave pages (even BIOS SMM mode).
227 The following sequence can be used:
228 1) Determine physical address of enclave page
229 2) Use "notrigger=1" mode to inject (this will setup
230 the injection address, but will not actually inject)
232 4) Store data to the virtual address matching physical address from step 1
233 5) Execute CLFLUSH for that virtual address
234 6) Spin delay for 250ms
235 7) Read from the virtual address. This will trigger the error
237 For more information about EINJ, please refer to ACPI specification
238 version 4.0, section 17.5 and ACPI 5.0, section 18.6.