On Thu, 2015-03-26 at 16:42 +1100, Gavin Shan wrote: > The patch adds one more EEH sub-command (VFIO_EEH_PE_INJECT_ERR) > to inject the specified EEH error, which is represented by > (struct vfio_eeh_pe_err), to the indicated PE for testing purpose. > > Signed-off-by: Gavin Shan <gwshan@xxxxxxxxxxxxxxxxxx> > Reviewed-by: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx> > --- > Documentation/vfio.txt | 12 ++++++++++++ > drivers/vfio/vfio_spapr_eeh.c | 10 ++++++++++ > include/uapi/linux/vfio.h | 14 +++++++++++++- > 3 files changed, 35 insertions(+), 1 deletion(-) > > diff --git a/Documentation/vfio.txt b/Documentation/vfio.txt > index 96978ec..4c746a7 100644 > --- a/Documentation/vfio.txt > +++ b/Documentation/vfio.txt > @@ -385,6 +385,18 @@ The code flow from the example above should be slightly changed: > > .... > > + /* Inject EEH error, which is expected to be caused by 32-bits > + * config load. > + */ > + pe_op.op = VFIO_EEH_PE_INJECT_ERR; > + pe_op.err.type = EEH_ERR_TYPE_32; > + pe_op.err.func = EEH_ERR_FUNC_LD_CFG_ADDR; > + pe_op.err.addr = 0ul; > + pe_op.err.mask = 0ul; > + ioctl(container, VFIO_EEH_PE_OP, &pe_op); > + > + .... > + > /* When 0xFF's returned from reading PCI config space or IO BARs > * of the PCI device. Check the PE's state to see if that has been > * frozen. > diff --git a/drivers/vfio/vfio_spapr_eeh.c b/drivers/vfio/vfio_spapr_eeh.c > index 5fa42db..38edeb4 100644 > --- a/drivers/vfio/vfio_spapr_eeh.c > +++ b/drivers/vfio/vfio_spapr_eeh.c > @@ -85,6 +85,16 @@ long vfio_spapr_iommu_eeh_ioctl(struct iommu_group *group, > case VFIO_EEH_PE_CONFIGURE: > ret = eeh_pe_configure(pe); > break; > + case VFIO_EEH_PE_INJECT_ERR: > + minsz = offsetofend(struct vfio_eeh_pe_op, err.mask); > + if (op.argsz < minsz) > + return -EINVAL; > + if (copy_from_user(&op, (void __user *)arg, minsz)) > + return -EFAULT; > + > + ret = eeh_pe_inject_err(pe, op.err.type, op.err.func, > + op.err.addr, op.err.mask); > + break; > default: > ret = -EINVAL; > } > diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h > index 82889c3..d81c17f 100644 > --- a/include/uapi/linux/vfio.h > +++ b/include/uapi/linux/vfio.h > @@ -468,12 +468,23 @@ struct vfio_iommu_spapr_tce_info { > * - unfreeze IO/DMA for frozen PE; > * - read PE state; > * - reset PE; > - * - configure PE. > + * - configure PE; > + * - inject EEH error. > */ > +struct vfio_eeh_pe_err { > + __u32 type; > + __u32 func; > + __u64 addr; > + __u64 mask; > +}; > + > struct vfio_eeh_pe_op { > __u32 argsz; > __u32 flags; > __u32 op; > + union { > + struct vfio_eeh_pe_err err; > + }; > }; > > #define VFIO_EEH_PE_DISABLE 0 /* Disable EEH functionality */ > @@ -490,6 +501,7 @@ struct vfio_eeh_pe_op { > #define VFIO_EEH_PE_RESET_HOT 6 /* Assert hot reset */ > #define VFIO_EEH_PE_RESET_FUNDAMENTAL 7 /* Assert fundamental reset */ > #define VFIO_EEH_PE_CONFIGURE 8 /* PE configuration */ > +#define VFIO_EEH_PE_INJECT_ERR 9 /* Inject EEH error */ > > #define VFIO_EEH_PE_OP _IO(VFIO_TYPE, VFIO_BASE + 21) > I assume you want this to go in through the PPC tree, so Acked-by: Alex Williamson <alex.williamson@xxxxxxxxxx> -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html