lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1245033777.5320.328.camel@yhuang-dev.sh.intel.com>
Date:	Mon, 15 Jun 2009 10:42:57 +0800
From:	Huang Ying <ying.huang@...el.com>
To:	"Barnes, Jesse" <jesse.barnes@...el.com>
Cc:	Andi Kleen <andi@...stfloor.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"linux-pci@...r.kernel.org" <linux-pci@...r.kernel.org>,
	jbarnes@...tuousgeek.org
Subject: Re: [PATCH 3/4] PCI: PCIE AER: PCIE AER software error injection

On Fri, 2009-06-12 at 23:53 +0800, Barnes, Jesse wrote:
> On Thu, 11 Jun 2009 18:54:01 -0700
> "Huang, Ying" <ying.huang@...el.com> wrote:
> 
> > On Fri, 2009-06-12 at 02:59 +0800, Barnes, Jesse wrote:
> > > On Fri, 24 Apr 2009 10:45:27 +0800
> > > Huang Ying <ying.huang@...el.com> wrote:
> > >
> > > > Debugging PCIE AER code can be very difficult because it is hard
> > > > to trigger various real hardware errors. This patch provide a
> > > > software based error injection tool, which can fake various PCIE
> > > > errors with a user space helper tool named "aer-inject". Which
> > > > can be gotten from:
> > > >
> > > >   http://www.kernel.org/pub/linux/kernel/people/yhuang/
> > > >
> > > > The patch fakes AER error by faking some PCIE AER related
> > > > registers and an AER interrupt for specified the PCIE device.
> > > >
> > > > Signed-off-by: Huang Ying <ying.huang@...el.com>
> > > >
> > >
> > > This patch got mangled, care to resend?
> > 
> > Sorry. Resend patch follows.
> > 
> 
> This one didn't apply either; can you pull down my linux-next branch
> and diff against that?  Also, cc my personal address,
> jbarnes@...tuousgeek.org, so Exchange doesn't mess up the patch.

Re-base on
git://git.kernel.org/pub/scm/linux/kernel/git/jbarnes/pci-2.6.git branch
linux-next.

Sent as attachment, I think that works even for Exchange.

Another patch to fix the user space tool URL is attached with the mail
too. Please fold it into inject document patch if possible.

Best Regards,
Huang Ying


View attachment "fix_inject_doc.patch" of type "text/x-patch" (763 bytes)

View attachment "inject.patch" of type "text/x-patch" (13286 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ