Error inject from OS

Adriana Kobylak anoo at us.ibm.com
Sat Dec 12 09:43:25 AEDT 2015


Last week we mentioned we wanted to get from Feroz the procedure to inject 
an error via putscom from the OS. Here is his reply:


You will need to download xscom-utils from 
https://github.com/open-power/skiboot/tree/master/external/xscom-utils and 
compile it on the host.

1) on Host os download the skiboot code with the following command 
git clone git://git.linux.ibm.com/skiboot/skiboot.git 

2) cd skiboot/external/xscom-utils 

3) compile the code --> "make" to get putscom and getscom binaries

Usages:
usage: getscom [-c|--chip chip-id] addr
       getscom -l|--list-chips
       getscom -v|--version

usage: putscom [-c|--chip chip-id] addr value
       putscom -v|--version

4) find out the chip and core details 
cat /sys/firmware/opal/msglog | grep Chip | grep Core 

5) Before you get/set any scom addresses you will need to query for chip 
ids as below:

$ getscom -l
Chip ID  | Rev   | Chip type
---------|-------|--------
00000008 | DD2.0 | P8 (Venice) processor
00000000 | DD2.0 | P8 (Venice) processor


6. Once you get chip id's you will then be able to issue set/get on scom 
addresses for chip ids.
    e.g.
        # Prim/Secondary Master/Slave Status Register (TOD Status 
Register)
        [root at fir01 xscom-utils]# ./getscom -c 0x8 0x00040008
        6663d0c00000000
        [root at fir01 xscom-utils]# ./getscom -c 0x0 0x00040008
        6663d0c00000000
 
        [root at fir01 xscom-utils]# ./putscom -c 0x0 0x40000 0x0 
        0


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ozlabs.org/pipermail/openbmc/attachments/20151211/ffaadc20/attachment.html>


More information about the openbmc mailing list