@@ -19,6 +19,20 @@ Description:
1919		is returned to the user. The inject_poison attribute is only
2020		visible for devices supporting the capability.
2121
22+ 		TEST-ONLY INTERFACE: This interface is intended for testing
23+ 		and validation purposes only. It is not a data repair mechanism
24+ 		and should never be used on production systems or live data.
25+ 
26+ 		DATA LOSS RISK: For CXL persistent memory (PMEM) devices,
27+ 		poison injection can result in permanent data loss. Injected
28+ 		poison may render data permanently inaccessible even after
29+ 		clearing, as the clear operation writes zeros and does not
30+ 		recover original data.
31+ 
32+ 		SYSTEM STABILITY RISK: For volatile memory, poison injection
33+ 		can cause kernel crashes, system instability, or unpredictable
34+ 		behavior if the poisoned addresses are accessed by running code
35+ 		or critical kernel structures.
2236
2337What:		/sys/kernel/debug/cxl/memX/clear_poison
2438Date:		April, 2023
@@ -35,6 +49,79 @@ Description:
3549		The clear_poison attribute is only visible for devices
3650		supporting the capability.
3751
52+ 		TEST-ONLY INTERFACE: This interface is intended for testing
53+ 		and validation purposes only. It is not a data repair mechanism
54+ 		and should never be used on production systems or live data.
55+ 
56+ 		CLEAR IS NOT DATA RECOVERY: This operation writes zeros to the
57+ 		specified address range and removes the address from the poison
58+ 		list. It does NOT recover or restore original data that may have
59+ 		been present before poison injection. Any original data at the
60+ 		cleared address is permanently lost and replaced with zeros.
61+ 
62+ 		CLEAR IS NOT A REPAIR MECHANISM: This interface is for testing
63+ 		purposes only and should not be used as a data repair tool.
64+ 		Clearing poison is fundamentally different from data recovery
65+ 		or error correction.
66+ 
67+ What:		/sys/kernel/debug/cxl/regionX/inject_poison
68+ Date:		August, 2025
69+ 70+ Description:
71+ 		(WO) When a Host Physical Address (HPA) is written to this
72+ 		attribute, the region driver translates it to a Device
73+ 		Physical Address (DPA) and identifies the corresponding
74+ 		memdev. It then sends an inject poison command to that memdev
75+ 		at the translated DPA. Refer to the memdev ABI entry at:
76+ 		/sys/kernel/debug/cxl/memX/inject_poison for the detailed
77+ 		behavior. This attribute is only visible if all memdevs
78+ 		participating in the region support both inject and clear
79+ 		poison commands.
80+ 
81+ 		TEST-ONLY INTERFACE: This interface is intended for testing
82+ 		and validation purposes only. It is not a data repair mechanism
83+ 		and should never be used on production systems or live data.
84+ 
85+ 		DATA LOSS RISK: For CXL persistent memory (PMEM) devices,
86+ 		poison injection can result in permanent data loss. Injected
87+ 		poison may render data permanently inaccessible even after
88+ 		clearing, as the clear operation writes zeros and does not
89+ 		recover original data.
90+ 
91+ 		SYSTEM STABILITY RISK: For volatile memory, poison injection
92+ 		can cause kernel crashes, system instability, or unpredictable
93+ 		behavior if the poisoned addresses are accessed by running code
94+ 		or critical kernel structures.
95+ 
96+ What:		/sys/kernel/debug/cxl/regionX/clear_poison
97+ Date:		August, 2025
98+ 99+ Description:
100+ 		(WO) When a Host Physical Address (HPA) is written to this
101+ 		attribute, the region driver translates it to a Device
102+ 		Physical Address (DPA) and identifies the corresponding
103+ 		memdev. It then sends a clear poison command to that memdev
104+ 		at the translated DPA. Refer to the memdev ABI entry at:
105+ 		/sys/kernel/debug/cxl/memX/clear_poison for the detailed
106+ 		behavior. This attribute is only visible if all memdevs
107+ 		participating in the region support both inject and clear
108+ 		poison commands.
109+ 
110+ 		TEST-ONLY INTERFACE: This interface is intended for testing
111+ 		and validation purposes only. It is not a data repair mechanism
112+ 		and should never be used on production systems or live data.
113+ 
114+ 		CLEAR IS NOT DATA RECOVERY: This operation writes zeros to the
115+ 		specified address range and removes the address from the poison
116+ 		list. It does NOT recover or restore original data that may have
117+ 		been present before poison injection. Any original data at the
118+ 		cleared address is permanently lost and replaced with zeros.
119+ 
120+ 		CLEAR IS NOT A REPAIR MECHANISM: This interface is for testing
121+ 		purposes only and should not be used as a data repair tool.
122+ 		Clearing poison is fundamentally different from data recovery
123+ 		or error correction.
124+ 
38125What:		/sys/kernel/debug/cxl/einj_types
39126Date:		January, 2024
40127KernelVersion:	v6.9
0 commit comments