public inbox for linux-cxl@vger.kernel.org
 help / color / mirror / Atom feed
From: "Cheatham, Benjamin" <benjamin.cheatham@amd.com>
To: Alison Schofield <alison.schofield@intel.com>
Cc: <nvdimm@lists.linux.dev>, <linux-cxl@vger.kernel.org>
Subject: Re: [ndctl PATCH v3] test/cxl-poison.sh: replace sysfs usage with cxl-cli cmds
Date: Thu, 19 Feb 2026 11:30:58 -0600	[thread overview]
Message-ID: <eb296e95-e121-41e2-bb49-8d91cfb9ecf6@amd.com> (raw)
In-Reply-To: <20260218191108.1471718-1-alison.schofield@intel.com>

On 2/18/2026 1:11 PM, Alison Schofield wrote:
> cxl-cli commands were recently added for poison inject and clear
> operations by memdev. Replace the writes to sysfs with the new
> commands in the cxl-poison unit test.
> 
> All cxl-test memdevs are created as poison_injectable, so just
> confirm that the new poison_injectable field is indeed 'true'.
> 
> Continue to use the sysfs writes for inject and clear poison
> by region offset until that support arrives in cxl-cli.
> 
> Signed-off-by: Alison Schofield <alison.schofield@intel.com>

LGTM

Reviewed-by: Ben Cheatham <benjamin.cheatham@amd.com>

> ---
> 
> Change in v3:
> Use new field 'poison_injectable' in memdev selection (BenC)
> Update commit log to include poison_injectable check.
> 
> Change in v2:
> Use final format of new cxl-cli cmds:
> 	inject-media-poison and clear-media-poison
> 
> 
>  test/cxl-poison.sh | 82 +++++++++++++++++++++++++---------------------
>  1 file changed, 44 insertions(+), 38 deletions(-)
> 
> diff --git a/test/cxl-poison.sh b/test/cxl-poison.sh
> index 58cf132b613b..bbd147c85a77 100644
> --- a/test/cxl-poison.sh
> +++ b/test/cxl-poison.sh
> @@ -20,7 +20,8 @@ find_memdev()
>  {
>  	readarray -t capable_mems < <("$CXL" list -b "$CXL_TEST_BUS" -M |
>  		jq -r ".[] | select(.pmem_size != null) |
> -		select(.ram_size != null) | .memdev")
> +		select(.ram_size != null) |
> +		select(.poison_injectable == true) | .memdev")
>  
>  	if [ ${#capable_mems[@]} == 0 ]; then
>  		echo "no memdevs found for test"
> @@ -41,32 +42,37 @@ find_auto_region()
>  	echo "$region"
>  }
>  
> -# When cxl-cli support for inject and clear arrives, replace
> -# the writes to /sys/kernel/debug with the new cxl commands.
> -
> -_do_poison_sysfs()
> +_do_poison()
>  {
>  	local action="$1" dev="$2" addr="$3"
>  	local expect_fail=${4:-false}
>  
> -	if "$expect_fail"; then
> -		if echo "$addr" > "/sys/kernel/debug/cxl/$dev/${action}_poison"; then
> -			echo "Expected ${action}_poison to fail for $addr"
> -			err "$LINENO"
> -		fi
> -	else
> -		echo "$addr" > "/sys/kernel/debug/cxl/$dev/${action}_poison"
> +	# Regions use sysfs, memdevs use cxl-cli commands
> +	if [[ "$dev" =~ ^region ]]; then
> +		local sysfs_path="/sys/kernel/debug/cxl/$dev/${action}_poison"
> +		"$expect_fail" && echo "$addr" > "$sysfs_path" && err "$LINENO"
> +		"$expect_fail" || echo "$addr" > "$sysfs_path"
> +		return
>  	fi
> +
> +	case "$action" in
> +	inject) local cmd=("$CXL" inject-media-poison "$dev" -a "$addr") ;;
> +	clear)	local cmd=("$CXL" clear-media-poison "$dev" -a "$addr") ;;
> +	*)	err "$LINENO" ;;
> +	esac
> +
> +	"$expect_fail" && "${cmd[@]}" && err "$LINENO"
> +	"$expect_fail" || "${cmd[@]}"
>  }
>  
> -inject_poison_sysfs()
> +inject_poison()
>  {
> -	_do_poison_sysfs 'inject' "$@"
> +	_do_poison 'inject' "$@"
>  }
>  
> -clear_poison_sysfs()
> +clear_poison()
>  {
> -	_do_poison_sysfs 'clear' "$@"
> +	_do_poison 'clear' "$@"
>  }
>  
>  check_trace_entry()
> @@ -121,27 +127,27 @@ validate_poison_found()
>  test_poison_by_memdev_by_dpa()
>  {
>  	find_memdev
> -	inject_poison_sysfs "$memdev" "0x40000000"
> -	inject_poison_sysfs "$memdev" "0x40001000"
> -	inject_poison_sysfs "$memdev" "0x600"
> -	inject_poison_sysfs "$memdev" "0x0"
> +	inject_poison "$memdev" "0x40000000"
> +	inject_poison "$memdev" "0x40001000"
> +	inject_poison "$memdev" "0x600"
> +	inject_poison "$memdev" "0x0"
>  	validate_poison_found "-m $memdev" 4
>  
> -	clear_poison_sysfs "$memdev" "0x40000000"
> -	clear_poison_sysfs "$memdev" "0x40001000"
> -	clear_poison_sysfs "$memdev" "0x600"
> -	clear_poison_sysfs "$memdev" "0x0"
> +	clear_poison "$memdev" "0x40000000"
> +	clear_poison "$memdev" "0x40001000"
> +	clear_poison "$memdev" "0x600"
> +	clear_poison "$memdev" "0x0"
>  	validate_poison_found "-m $memdev" 0
>  }
>  
>  test_poison_by_region_by_dpa()
>  {
> -	inject_poison_sysfs "$mem0" "0"
> -	inject_poison_sysfs "$mem1" "0"
> +	inject_poison "$mem0" "0"
> +	inject_poison "$mem1" "0"
>  	validate_poison_found "-r $region" 2
>  
> -	clear_poison_sysfs "$mem0" "0"
> -	clear_poison_sysfs "$mem1" "0"
> +	clear_poison "$mem0" "0"
> +	clear_poison "$mem1" "0"
>  	validate_poison_found "-r $region" 0
>  }
>  
> @@ -168,15 +174,15 @@ test_poison_by_region_offset()
>  	# Inject at the offset and check result using the hpa
>  	# ABI takes an offset, but recall the hpa to check trace event
>  
> -	inject_poison_sysfs "$region" "$cache_size"
> +	inject_poison "$region" "$cache_size"
>  	check_trace_entry "$region" "$hpa1"
> -	inject_poison_sysfs "$region" "$((gran + cache_size))"
> +	inject_poison "$region" "$((gran + cache_size))"
>  	check_trace_entry "$region" "$hpa2"
>  	validate_poison_found "-r $region" 2
>  
> -	clear_poison_sysfs "$region" "$cache_size"
> +	clear_poison "$region" "$cache_size"
>  	check_trace_entry "$region" "$hpa1"
> -	clear_poison_sysfs "$region" "$((gran + cache_size))"
> +	clear_poison "$region" "$((gran + cache_size))"
>  	check_trace_entry "$region" "$hpa2"
>  	validate_poison_found "-r $region" 0
>  }
> @@ -196,21 +202,21 @@ test_poison_by_region_offset_negative()
>  	if [[ $cache_size -gt 0 ]]; then
>  		cache_offset=$((cache_size - 1))
>  		echo "Testing offset within cache: $cache_offset (cache_size: $cache_size)"
> -		inject_poison_sysfs "$region" "$cache_offset" true
> -		clear_poison_sysfs "$region" "$cache_offset" true
> +		inject_poison "$region" "$cache_offset" true
> +		clear_poison "$region" "$cache_offset" true
>  	else
>  		echo "Skipping cache test - cache_size is 0"
>  	fi
>  
>  	# Offset exceeds region size
>  	exceed_offset=$((region_size))
> -	inject_poison_sysfs "$region" "$exceed_offset" true
> -	clear_poison_sysfs "$region" "$exceed_offset" true
> +	inject_poison "$region" "$exceed_offset" true
> +	clear_poison "$region" "$exceed_offset" true
>  
>  	# Offset exceeds region size by a lot
>  	large_offset=$((region_size * 2))
> -	inject_poison_sysfs "$region" "$large_offset" true
> -	clear_poison_sysfs "$region" "$large_offset" true
> +	inject_poison "$region" "$large_offset" true
> +	clear_poison "$region" "$large_offset" true
>  }
>  
>  is_unaligned() {


      parent reply	other threads:[~2026-02-19 17:31 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-02-18 19:11 [ndctl PATCH v3] test/cxl-poison.sh: replace sysfs usage with cxl-cli cmds Alison Schofield
2026-02-18 21:15 ` Dave Jiang
2026-02-19 17:30 ` Cheatham, Benjamin [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=eb296e95-e121-41e2-bb49-8d91cfb9ecf6@amd.com \
    --to=benjamin.cheatham@amd.com \
    --cc=alison.schofield@intel.com \
    --cc=linux-cxl@vger.kernel.org \
    --cc=nvdimm@lists.linux.dev \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox