Bug 1211871 - 'modprobe einj param_extension=1' shows module einj not found
Summary: 'modprobe einj param_extension=1' shows module einj not found
Status: RESOLVED INVALID
Alias: None
Product: ALP Bedrock
Classification: SUSE ALP - SUSE Adaptable Linux Platform
Component: Other (show other bugs)
Version: unspecified
Hardware: x86-64 Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Kernel Bugs
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-05-31 14:46 UTC by su jiajia
Modified: 2023-08-02 16:03 UTC (History)
7 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description su jiajia 2023-05-31 14:46:25 UTC
Description of problem:
'modprobe einj param_extension=1'  shows module einj not found 

Version-Release number of selected component (if applicable):
https://mirror.tspu.ru/opensuse/repositories/SUSE%3A/ALP%3A/Products%3A/Installer%3A/0.8/images/iso/d-installer-live.x86_64-ALP.iso

Steps to Reproduce:
1.Setting below UEFI settings:
AdvancedRAS.MachineCheckRecovery=enabled
Memory.WHEAErrorInjectionSupport=enabled
Memory.SWErrorInjectionSupport=enabled
Memory.McaBankErrorInjectionSupport=enabled
Memory.PMEMErrorInjection=enabled
Processors.SnoopPreference='Home Snoop'
Memory.CorrectableErrorThreshold=2
Memory.PatrolScrubInterval=24
AdvancedRAS.EVDFXFeatures=enabled
AdvancedRAS.LockChipset=disabled
Memory.PollCEevent=enabled
SystemOobCustom.PFATest=enabled
2.Boot into OS,run command 'modprobe einj param_extension=1'

Expected results:
Succeed run this command to load einj module

Current behavirous:
localhost:/home/test # modprobe einj param_extension=1
modprobe: FATAL: Module einj not found in directory /lib/modules/6.1.12-3-default
localhost:/home/test #

Addition info:
1.Not found mcelog package
Comment 1 Takashi Iwai 2023-08-02 16:03:10 UTC
einj is disabled intentionally due to the security issue ((bsc#1023051, CVE-2016-3695).