From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753368Ab0ESGkN (ORCPT ); Wed, 19 May 2010 02:40:13 -0400 Received: from mx3.mail.elte.hu ([157.181.1.138]:36270 "EHLO mx3.mail.elte.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752977Ab0ESGkL (ORCPT ); Wed, 19 May 2010 02:40:11 -0400 Date: Wed, 19 May 2010 08:39:33 +0200 From: Ingo Molnar To: Tony Luck Cc: Joe Perches , Mauro Carvalho Chehab , Hidetoshi Seto , Linux Kernel Mailing List , "bluesmoke-devel@lists.sourceforge.net" , Linux Edac Mailing List , Thomas Gleixner , Ingo Molnar , Ben Woodard , Matt Domsch , Doug Thompson , Borislav Petkov , "Young, Brent" , Peter Zijlstra , =?iso-8859-1?Q?Fr=E9d=E9ric?= Weisbecker , Arnaldo Carvalho de Melo Subject: Re: Hardware Error Kernel Mini-Summit Message-ID: <20100519063933.GA32581@elte.hu> References: <4BF18995.6070008@redhat.com> <4BF2392A.9040409@jp.fujitsu.com> <4BF2C3D1.10009@redhat.com> <1274204560.17703.82.camel@Joe-Laptop.home> <20100518185305.GA23921@elte.hu> <987664A83D2D224EAE907B061CE93D53C61D1C57@orsmsx505.amr.corp.intel.com> <20100518193022.GB30936@elte.hu> <20100518204204.GA23204@elte.hu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.20 (2009-08-17) X-ELTE-SpamScore: -2.0 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-2.0 required=5.9 tests=BAYES_00 autolearn=no SpamAssassin version=3.2.5 -2.0 BAYES_00 BODY: Bayesian spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Tony Luck wrote: > > 3) Another new perf feature of interest is 'perf > > inject' (this too went upstream today): to inject > > artificial events into the stream of events. This > > mechanism could be used to simulate rare error > > conditions and to test out policy reactions > > systematically - an important part of system error > > recovery testing. > > Simulated errors are handy for testing the very top > level of the s/w stack. But real errors are better. > There's some APEI code in Len's tree that can inject > real errors (on systems with the right BIOS hooks > enabled). Agreed, hardware assisted error injection is by far the best and most complete solution. Thanks, Ingo