Error inject from OS
Adriana Kobylak
anoo at us.ibm.com
Sat Dec 12 09:43:25 AEDT 2015
Last week we mentioned we wanted to get from Feroz the procedure to inject
an error via putscom from the OS. Here is his reply:
You will need to download xscom-utils from
https://github.com/open-power/skiboot/tree/master/external/xscom-utils and
compile it on the host.
1) on Host os download the skiboot code with the following command
git clone git://git.linux.ibm.com/skiboot/skiboot.git
2) cd skiboot/external/xscom-utils
3) compile the code --> "make" to get putscom and getscom binaries
Usages:
usage: getscom [-c|--chip chip-id] addr
getscom -l|--list-chips
getscom -v|--version
usage: putscom [-c|--chip chip-id] addr value
putscom -v|--version
4) find out the chip and core details
cat /sys/firmware/opal/msglog | grep Chip | grep Core
5) Before you get/set any scom addresses you will need to query for chip
ids as below:
$ getscom -l
Chip ID | Rev | Chip type
---------|-------|--------
00000008 | DD2.0 | P8 (Venice) processor
00000000 | DD2.0 | P8 (Venice) processor
6. Once you get chip id's you will then be able to issue set/get on scom
addresses for chip ids.
e.g.
# Prim/Secondary Master/Slave Status Register (TOD Status
Register)
[root at fir01 xscom-utils]# ./getscom -c 0x8 0x00040008
6663d0c00000000
[root at fir01 xscom-utils]# ./getscom -c 0x0 0x00040008
6663d0c00000000
[root at fir01 xscom-utils]# ./putscom -c 0x0 0x40000 0x0
0
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ozlabs.org/pipermail/openbmc/attachments/20151211/ffaadc20/attachment.html>
More information about the openbmc
mailing list