new file mode 100644
@@ -0,0 +1,135 @@
+#!/bin/bash
+# SPDX-License-Identifier: GPL-2.0
+# Copyright (C) 2022 Intel Corporation. All rights reserved.
+
+. $(dirname $0)/common
+
+rc=77
+
+set -ex
+
+trap 'err $LINENO' ERR
+
+check_prereq "jq"
+
+modprobe -r cxl_test
+modprobe cxl_test
+
+rc=1
+
+# THEORY OF OPERATION: Exercise cxl-cli and cxl driver ability to
+# inject, clear, and get the poison list. Do it by memdev and by region.
+# Based on current cxl-test topology.
+
+find_memdev()
+{
+ readarray -t capable_mems < <("$CXL" list -b "$CXL_TEST_BUS" -M |
+ jq -r ".[] | select(.pmem_size != null) |
+ select(.ram_size != null) | .memdev")
+
+ if [ ${#capable_mems[@]} == 0 ]; then
+ echo "no memdevs found for test"
+ err "$LINENO"
+ fi
+
+ memdev=${capable_mems[0]}
+}
+
+setup_x2_region()
+{
+ # Find an x2 decoder
+ decoder=$($CXL list -b "$CXL_TEST_BUS" -D -d root | jq -r ".[] |
+ select(.pmem_capable == true) |
+ select(.nr_targets == 2) |
+ .decoder")
+
+ # Find a memdev for each host-bridge interleave position
+ port_dev0=$($CXL list -T -d $decoder | jq -r ".[] |
+ .targets | .[] | select(.position == 0) | .target")
+ port_dev1=$($CXL list -T -d $decoder | jq -r ".[] |
+ .targets | .[] | select(.position == 1) | .target")
+ mem0=$($CXL list -M -p $port_dev0 | jq -r ".[0].memdev")
+ mem1=$($CXL list -M -p $port_dev1 | jq -r ".[0].memdev")
+ memdevs="$mem0 $mem1"
+}
+
+create_region()
+{
+ setup_x2_region
+ region=$($CXL create-region -d $decoder -m $memdevs | jq -r ".region")
+ if [[ ! $region ]]; then
+ echo "create-region failed for $decoder"
+ err "$LINENO"
+ fi
+}
+
+# When cxl-cli support for inject and clear arrives, replace
+# the writes to /sys/kernel/debug with the new cxl commands.
+
+inject_poison_sysfs()
+{
+ memdev="$1"
+ addr="$2"
+
+ echo "$addr" > /sys/kernel/debug/cxl/"$memdev"/inject_poison
+}
+
+clear_poison_sysfs()
+{
+ memdev="$1"
+ addr="$2"
+
+ echo "$addr" > /sys/kernel/debug/cxl/"$memdev"/clear_poison
+}
+
+find_media_errors()
+{
+ local json="$1"
+
+ nr="$(jq -r ".nr_records" <<< "$json")"
+ if [[ $nr != $NR_ERRS ]]; then
+ echo "$mem: $NR_ERRS poison records expected, $nr found"
+ err "$LINENO"
+ fi
+}
+
+# Turn tracing on. Note that 'cxl list --poison' does toggle the tracing.
+# Turning it on here allows the test user to also view inject and clear
+# trace events.
+echo 1 > /sys/kernel/tracing/events/cxl/cxl_poison/enable
+
+# Poison by memdev
+# Inject then clear into cxl_test known pmem and ram partitions
+find_memdev
+inject_poison_sysfs "$memdev" "0x40000000"
+inject_poison_sysfs "$memdev" "0x40001000"
+inject_poison_sysfs "$memdev" "0x600"
+inject_poison_sysfs "$memdev" "0x0"
+NR_ERRS=4
+json=$("$CXL" list -m "$memdev" --poison | jq -r '.[].poison')
+find_media_errors "$json"
+clear_poison_sysfs "$memdev" "0x40000000"
+clear_poison_sysfs "$memdev" "0x40001000"
+clear_poison_sysfs "$memdev" "0x600"
+clear_poison_sysfs "$memdev" "0x0"
+NR_ERRS=0
+json=$("$CXL" list -m "$memdev" --poison | jq -r '.[].poison')
+find_media_errors "$json"
+
+# Poison by region
+# Inject then clear into cxl_test known pmem dpa mappings
+create_region
+inject_poison_sysfs "$mem0" "0x40000000"
+inject_poison_sysfs "$mem1" "0x40000000"
+NR_ERRS=2
+json=$("$CXL" list -r "$region" --poison | jq -r '.[].poison')
+find_media_errors "$json"
+clear_poison_sysfs "$mem0" "0x40000000"
+clear_poison_sysfs "$mem1" "0x40000000"
+NR_ERRS=0
+json=$("$CXL" list -r "$region" --poison | jq -r '.[].poison')
+find_media_errors "$json"
+
+check_dmesg "$LINENO"
+
+modprobe -r cxl-test
@@ -157,6 +157,7 @@ cxl_create_region = find_program('cxl-create-region.sh')
cxl_xor_region = find_program('cxl-xor-region.sh')
cxl_update_firmware = find_program('cxl-update-firmware.sh')
cxl_events = find_program('cxl-events.sh')
+cxl_poison = find_program('cxl-poison.sh')
tests = [
[ 'libndctl', libndctl, 'ndctl' ],
@@ -186,6 +187,7 @@ tests = [
[ 'cxl-create-region.sh', cxl_create_region, 'cxl' ],
[ 'cxl-xor-region.sh', cxl_xor_region, 'cxl' ],
[ 'cxl-events.sh', cxl_events, 'cxl' ],
+ [ 'cxl-poison.sh', cxl_poison, 'cxl' ],
]
if get_option('destructive').enabled()