From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:43505) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Wyttk-0006Ip-1i for qemu-devel@nongnu.org; Sun, 22 Jun 2014 22:22:28 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1Wyttb-0002dj-Sq for qemu-devel@nongnu.org; Sun, 22 Jun 2014 22:22:19 -0400 Received: from e23smtp06.au.ibm.com ([202.81.31.148]:45694) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Wyttb-0002dL-5c for qemu-devel@nongnu.org; Sun, 22 Jun 2014 22:22:11 -0400 Received: from /spool/local by e23smtp06.au.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 23 Jun 2014 12:22:06 +1000 Received: from d23relay03.au.ibm.com (d23relay03.au.ibm.com [9.190.235.21]) by d23dlp01.au.ibm.com (Postfix) with ESMTP id 8563C2CE8047 for ; Mon, 23 Jun 2014 12:22:03 +1000 (EST) Received: from d23av01.au.ibm.com (d23av01.au.ibm.com [9.190.234.96]) by d23relay03.au.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id s5N2LlDA9437498 for ; Mon, 23 Jun 2014 12:21:47 +1000 Received: from d23av01.au.ibm.com (localhost [127.0.0.1]) by d23av01.au.ibm.com (8.14.4/8.14.4/NCO v10.0 AVout) with ESMTP id s5N2M2tf015550 for ; Mon, 23 Jun 2014 12:22:02 +1000 From: Gavin Shan Date: Mon, 23 Jun 2014 12:22:00 +1000 Message-Id: <1403490123-15969-1-git-send-email-gwshan@linux.vnet.ibm.com> Subject: [Qemu-devel] [PATCH v1 0/3] Support PCI Error Injection List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Cc: aik@ozlabs.ru, qiudayu@linux.vnet.ibm.com, agraf@suse.de, Gavin Shan There is one guest userland utility "errinjct" used to inject various types of errors for testing purpose. The utility works with 3 RTAS calls, which are defined in PAPR spec as follows: - "ibm,open-errinjct": Apply for token to do error injection - "ibm,close-errinjct": Free the token assigned previously - "ibm,errinjct": Do error injection The series of patches support above RTAS calls in order to support error injection. For now, we only support PCI related error injection (32-bits and 64-bits PCI error types) and have to figure out the error injection for other types in future. It requires corresponding kernel changes as follows. Please comments, thanks! http://patchwork.ozlabs.org/patch/362637/ http://patchwork.ozlabs.org/patch/362638/ http://patchwork.ozlabs.org/patch/362639/ Gavin Shan (3): sPAPR: Implement PCI error injection RTAS calls sPAPR: Implement sPAPRPHBClass::format_errinjct_cmd sPAPR: Export RTAS property hw/ppc/spapr.c | 19 +++++ hw/ppc/spapr_pci_vfio.c | 19 +++++ hw/ppc/spapr_rtas.c | 198 ++++++++++++++++++++++++++++++++++++++++++++ include/hw/pci-host/spapr.h | 11 +++ include/hw/ppc/spapr.h | 35 ++++++++ 5 files changed, 282 insertions(+) -- 1.8.3.2