einj.txt 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177
  1. APEI Error INJection
  2. ~~~~~~~~~~~~~~~~~~~~
  3. EINJ provides a hardware error injection mechanism. It is very useful
  4. for debugging and testing APEI and RAS features in general.
  5. You need to check whether your BIOS supports EINJ first. For that, look
  6. for early boot messages similar to this one:
  7. ACPI: EINJ 0x000000007370A000 000150 (v01 INTEL 00000001 INTL 00000001)
  8. which shows that the BIOS is exposing an EINJ table - it is the
  9. mechanism through which the injection is done.
  10. Alternatively, look in /sys/firmware/acpi/tables for an "EINJ" file,
  11. which is a different representation of the same thing.
  12. It doesn't necessarily mean that EINJ is not supported if those above
  13. don't exist: before you give up, go into BIOS setup to see if the BIOS
  14. has an option to enable error injection. Look for something called WHEA
  15. or similar. Often, you need to enable an ACPI5 support option prior, in
  16. order to see the APEI,EINJ,... functionality supported and exposed by
  17. the BIOS menu.
  18. To use EINJ, make sure the following are options enabled in your kernel
  19. configuration:
  20. CONFIG_DEBUG_FS
  21. CONFIG_ACPI_APEI
  22. CONFIG_ACPI_APEI_EINJ
  23. The EINJ user interface is in <debugfs mount point>/apei/einj.
  24. The following files belong to it:
  25. - available_error_type
  26. This file shows which error types are supported:
  27. Error Type Value Error Description
  28. ================ =================
  29. 0x00000001 Processor Correctable
  30. 0x00000002 Processor Uncorrectable non-fatal
  31. 0x00000004 Processor Uncorrectable fatal
  32. 0x00000008 Memory Correctable
  33. 0x00000010 Memory Uncorrectable non-fatal
  34. 0x00000020 Memory Uncorrectable fatal
  35. 0x00000040 PCI Express Correctable
  36. 0x00000080 PCI Express Uncorrectable fatal
  37. 0x00000100 PCI Express Uncorrectable non-fatal
  38. 0x00000200 Platform Correctable
  39. 0x00000400 Platform Uncorrectable non-fatal
  40. 0x00000800 Platform Uncorrectable fatal
  41. The format of the file contents are as above, except present are only
  42. the available error types.
  43. - error_type
  44. Set the value of the error type being injected. Possible error types
  45. are defined in the file available_error_type above.
  46. - error_inject
  47. Write any integer to this file to trigger the error injection. Make
  48. sure you have specified all necessary error parameters, i.e. this
  49. write should be the last step when injecting errors.
  50. - flags
  51. Present for kernel versions 3.13 and above. Used to specify which
  52. of param{1..4} are valid and should be used by the firmware during
  53. injection. Value is a bitmask as specified in ACPI5.0 spec for the
  54. SET_ERROR_TYPE_WITH_ADDRESS data structure:
  55. Bit 0 - Processor APIC field valid (see param3 below).
  56. Bit 1 - Memory address and mask valid (param1 and param2).
  57. Bit 2 - PCIe (seg,bus,dev,fn) valid (see param4 below).
  58. If set to zero, legacy behavior is mimicked where the type of
  59. injection specifies just one bit set, and param1 is multiplexed.
  60. - param1
  61. This file is used to set the first error parameter value. Its effect
  62. depends on the error type specified in error_type. For example, if
  63. error type is memory related type, the param1 should be a valid
  64. physical memory address. [Unless "flag" is set - see above]
  65. - param2
  66. Same use as param1 above. For example, if error type is of memory
  67. related type, then param2 should be a physical memory address mask.
  68. Linux requires page or narrower granularity, say, 0xfffffffffffff000.
  69. - param3
  70. Used when the 0x1 bit is set in "flags" to specify the APIC id
  71. - param4
  72. Used when the 0x4 bit is set in "flags" to specify target PCIe device
  73. - notrigger
  74. The error injection mechanism is a two-step process. First inject the
  75. error, then perform some actions to trigger it. Setting "notrigger"
  76. to 1 skips the trigger phase, which *may* allow the user to cause the
  77. error in some other context by a simple access to the CPU, memory
  78. location, or device that is the target of the error injection. Whether
  79. this actually works depends on what operations the BIOS actually
  80. includes in the trigger phase.
  81. BIOS versions based on the ACPI 4.0 specification have limited options
  82. in controlling where the errors are injected. Your BIOS may support an
  83. extension (enabled with the param_extension=1 module parameter, or boot
  84. command line einj.param_extension=1). This allows the address and mask
  85. for memory injections to be specified by the param1 and param2 files in
  86. apei/einj.
  87. BIOS versions based on the ACPI 5.0 specification have more control over
  88. the target of the injection. For processor-related errors (type 0x1, 0x2
  89. and 0x4), you can set flags to 0x3 (param3 for bit 0, and param1 and
  90. param2 for bit 1) so that you have more information added to the error
  91. signature being injected. The actual data passed is this:
  92. memory_address = param1;
  93. memory_address_range = param2;
  94. apicid = param3;
  95. pcie_sbdf = param4;
  96. For memory errors (type 0x8, 0x10 and 0x20) the address is set using
  97. param1 with a mask in param2 (0x0 is equivalent to all ones). For PCI
  98. express errors (type 0x40, 0x80 and 0x100) the segment, bus, device and
  99. function are specified using param1:
  100. 31 24 23 16 15 11 10 8 7 0
  101. +-------------------------------------------------+
  102. | segment | bus | device | function | reserved |
  103. +-------------------------------------------------+
  104. Anyway, you get the idea, if there's doubt just take a look at the code
  105. in drivers/acpi/apei/einj.c.
  106. An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected.
  107. In this case a file named vendor will contain identifying information
  108. from the BIOS that hopefully will allow an application wishing to use
  109. the vendor-specific extension to tell that they are running on a BIOS
  110. that supports it. All vendor extensions have the 0x80000000 bit set in
  111. error_type. A file vendor_flags controls the interpretation of param1
  112. and param2 (1 = PROCESSOR, 2 = MEMORY, 4 = PCI). See your BIOS vendor
  113. documentation for details (and expect changes to this API if vendors
  114. creativity in using this feature expands beyond our expectations).
  115. An error injection example:
  116. # cd /sys/kernel/debug/apei/einj
  117. # cat available_error_type # See which errors can be injected
  118. 0x00000002 Processor Uncorrectable non-fatal
  119. 0x00000008 Memory Correctable
  120. 0x00000010 Memory Uncorrectable non-fatal
  121. # echo 0x12345000 > param1 # Set memory address for injection
  122. # echo $((-1 << 12)) > param2 # Mask 0xfffffffffffff000 - anywhere in this page
  123. # echo 0x8 > error_type # Choose correctable memory error
  124. # echo 1 > error_inject # Inject now
  125. You should see something like this in dmesg:
  126. [22715.830801] EDAC sbridge MC3: HANDLING MCE MEMORY ERROR
  127. [22715.834759] EDAC sbridge MC3: CPU 0: Machine Check Event: 0 Bank 7: 8c00004000010090
  128. [22715.834759] EDAC sbridge MC3: TSC 0
  129. [22715.834759] EDAC sbridge MC3: ADDR 12345000 EDAC sbridge MC3: MISC 144780c86
  130. [22715.834759] EDAC sbridge MC3: PROCESSOR 0:306e7 TIME 1422553404 SOCKET 0 APIC 0
  131. [22716.616173] EDAC MC3: 1 CE memory read error on CPU_SrcID#0_Channel#0_DIMM#0 (channel:0 slot:0 page:0x12345 offset:0x0 grain:32 syndrome:0x0 - area:DRAM err_code:0001:0090 socket:0 channel_mask:1 rank:0)
  132. For more information about EINJ, please refer to ACPI specification
  133. version 4.0, section 17.5 and ACPI 5.0, section 18.6.