[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] MCA injection (debug) code



Frank van der Linden wrote:
The attached patch adds the capability for dom0 to inject MCA errors into Xen. The basic idea is to add specific MSR values that will be read by the polling code or the #MC handler. On AMD cpus, the MSRs can actually be written, on Intel CPUs, interpose code is used to fake the MSR values.
Since actual hardware problems are rare, it's convenient to be able to 
test the code like this. We run our testsuite using this code. Others 
have expressed some interest in this, so that's why I'm submitting this 
patch.
- Frank
Btw, this patch is on top of the main patch, but since that one is a bit 
big, it looks like it's stuck in the mailing list queue (probably 
waiting for approval).
- Frank

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.