Lines Matching +full:trigger +full:- +full:address

1 .. SPDX-License-Identifier: GPL-2.0
15 which shows that the BIOS is exposing an EINJ table - it is the
43 - available_error_type
51 0x00000002 Processor Uncorrectable non-fatal
54 0x00000010 Memory Uncorrectable non-fatal
57 0x00000080 PCI Express Uncorrectable non-fatal
60 0x00000400 Platform Uncorrectable non-fatal
70 - error_type
75 - error_inject
77 Write any integer to this file to trigger the error injection. Make
81 - flags
91 Memory address and mask valid (param1 and param2).
100 - param1
105 physical memory address. [Unless "flag" is set - see above]
107 - param2
110 related type, then param2 should be a physical memory address mask.
113 - param3
117 - param4
120 - notrigger
122 The error injection mechanism is a two-step process. First inject the
123 error, then perform some actions to trigger it. Setting "notrigger"
124 to 1 skips the trigger phase, which *may* allow the user to cause the
128 includes in the trigger phase.
130 - component_id0 .. component_idN, component_syndrome0 .. component_syndromeN
133 of the EINJv2 Extension Structure. Each holds a 128-bit
135 sets an invalid (all-ones) value.
141 - einj_types:
146 - $dport_dev/einj_inject:
158 command line einj.param_extension=1). This allows the address and mask
163 the target of the injection. For processor-related errors (type 0x1, 0x2
173 For memory errors (type 0x8, 0x10 and 0x20) the address is set using
179 +-------------------------------------------------+
181 +-------------------------------------------------+
186 An ACPI 5.0 BIOS may also allow vendor-specific errors to be injected.
189 the vendor-specific extension to tell that they are running on a BIOS
201 0x00000002 Processor Uncorrectable non-fatal
203 0x00000010 Memory Uncorrectable non-fatal
204 # echo 0x12345000 > param1 # Set memory address for injection
205 # echo 0xfffffffffffff000 > param2 # Mask - anywhere in this page
213 0x00000002 Processor Uncorrectable non-fatal
215 0x00000010 Memory Uncorrectable non-fatal
219 # echo 0x12345000 > param1 # Set memory address for injection
220 # echo 0xfffffffffffff000 > param2 # Range - anywhere in this page
237 …el#0_DIMM#0 (channel:0 slot:0 page:0x12345 offset:0x0 grain:32 syndrome:0x0 - area:DRAM err_code:…
246 0x00010000 CXL.mem Protocol Uncorrectable non-fatal
256 trigger that will inject the error on the next write to the target
257 address. But the h/w prevents any software outside of an SGX enclave
261 1) Determine physical address of enclave page
263 the injection address, but will not actually inject)
265 4) Store data to the virtual address matching physical address from step 1
266 5) Execute CLFLUSH for that virtual address
268 7) Read from the virtual address. This will trigger the error