Abstract:
A method for synchronizing processors during a system management interrupt caused from a memory hot plug event in multiple processor systems is disclosed. In one embodiment, a method for synchronizing processors during an assertion of a system management interrupt (SMI) in an information handling system including, for each processor, identifying whether the processor is an interrupt handling processor assigned to perform processing tasks necessary for resolving the SMI or a non-interrupt handling processor not assigned to perform the processing tasks necessary for resolving the SMI. The method further includes creating a task structure operable to cause non-interrupt handling processors to perform at least one task for each interrupt handling processor. The method further includes automatically performing the at least one task during the SMI for each non-interrupt handling processor.
Abstract:
In accordance with the present disclosure, a method and system for logging recoverable errors in an information handling system is disclosed. The system includes a central processing unit, a chipset coupled to the central processing unit, and at least one chipset memory unit coupled to and associated with the chipset. The system also includes a Baseboard Management Controller (BMC), and a memory unit containing a Basic Input Output System (BIOS). A System Management Interrupt (SMI) is periodically invoked. A status register is scanned to detect whether a recoverable error has occurred. If a recoverable error is detected, the system logs the recoverable error in a memory unit associated with the baseboard management controller. The system logs information that indicates a source of the recoverable error and that source's location. If no recoverable errors are detected, the system transmits a communication indicating that no recoverable errors have occurred.
Abstract:
A system and method is disclosed for enumerating multi-level processor-memory affinities for non-uniform memory access systems. A processor-memory affinity hierarchy for each possible pairing of a microprocessor and a memory unit in an information-handling system is calculated using at least two characteristics relating to memory-access speed that describe how the microprocessors and memory units are arranged in the information-handling system. The information-handling system then performs an algorithm on each processor-memory affinity hierarchy to obtain processor-memory affinity values in the information-handling system, and populates a table using the processor-memory affinity values. An operating system in the information-handling system can use the table to allocate memory units among microprocessors in the information-handling system.
Abstract:
Methods and apparatuses relating to instruction set architecture (ISA) based and automatic load tracking hardware for opportunistic re-steer of data-dependent flaky branches are described. In one embodiment, a processor includes a pipeline circuit comprising a decoder to decode instructions into decoded instructions and an execution circuit to execute the decoded instructions, a branch predictor circuit to generate a predicted path for a branch instruction, and a branch re-steer circuit to, for the branch instruction dependent on a result from a load instruction, check if an instruction received by the pipeline circuit is the load instruction, and when the instruction received by the pipeline circuit is the load instruction, check for a write back of the result from the load instruction between a decode of the branch instruction with the decoder and an execution of the branch instruction with the execution circuit, and when the predicted path differs from a path based on the result from the load instruction, re-steer the branch instruction in the pipeline circuit to the path and cause execution of the branch instruction for the path based on the result from the load instruction.
Abstract:
Method, apparatus and systems for performing hardware-based memory migration and copy operations. Under the method, a first portion of memory in a computer system accessed via a first memory controller is migrated or copied to a second portion of memory accessed via a second memory controller using a hardware-based scheme that is implemented independent of and transparent to software running on a computer system. The memory migration and/or copy operations can be used to initialize a memory mirror configuration under which data in first and second portions of memory are mirrored, and to perform memory migration operations in which data in a first portion of memory is migrated to a second portion of memory under the control of hardware in a manner in which the memory migration can be performed during run-time without a significant reduction in performance. In addition, poison data indicating failed cache lines may be migrated or copied such that data corresponding to migrated or copied poisoned cache lines are not used.
Abstract:
Systems, methods and apparatuses for configuring a set of devices of a structure are disclosed. One method includes loading a structure plan to a mobile computing device, wherein the structure plan is associated with the structure, communicating, by the mobile computing device, with one or more of the set of devices, communicating, by each of the one or more of the set of devices, a device identifier and proximity dependent information of the device back to the mobile computing device, wherein the proximity dependent information allows the mobile computing device to estimate a proximate location of the device, and placing, by the mobile computing device, each of the one or more of the set of devices on the structure floor plan based at least in part on the proximity dependent information.
Abstract:
Techniques associated with subscription-based electronic messaging are described in various implementations. In one example implementation, a method may include obtaining registration information associated with a user who has subscribed to receive electronic messages from a subscription-based messaging service. The registration information may include an electronic address of the user and a private token that is known to the user and to the subscription-based messaging service. The method may also include embedding the private token in an electronic message associated with the subscription-based messaging service, and such inclusion of the private token may indicate to the user that the electronic message is from a legitimate sender associated with the subscription-based messaging service. The method may also include sending the electronic message to the electronic address of the user.
Abstract:
Methods and apparatus related to performance of telemetry, data gathering, and failure isolation using non-volatile memory are described. In one embodiment, a Non-Volatile Memory (NVM) controller logic stores data in a portion of an NVM device. The portion of the NVM device is determined based at least in part on a type or an identity of a sender of the data. Also, the data is encrypted in accordance with a public key provided by the sender. Other embodiments are also disclosed and claimed.
Abstract:
Systems, methods and apparatuses for configuring a set of devices of a structure are disclosed. One method includes loading a structure plan to a mobile computing device, wherein the structure plan is associated with the structure, communicating, by the mobile computing device, with one or more of the set of devices, communicating, by each of the one or more of the set of devices, a device identifier and proximity dependent information of the device back to the mobile computing device, wherein the proximity dependent information allows the mobile computing device to estimate a proximate location of the device, and placing, by the mobile computing device, each of the one or more of the set of devices on the structure floor plan based at least in part on the proximity dependent information.
Abstract:
Test points on an integrated circuit chip, especially points subject to IR voltage drop along power supply rails, are coupled to comparators controlled by an automatic test controller, all included on the chip. Each test point can have one or more comparators and one or more reference voltages over a testing range. A change of state at a comparator sets a latch that is read and reset by the on-chip automatic test controller during test intervals. The automatic test controller can coordinate with external automatic test equipment that applies stimulus signals to the chip during testing. The greatest voltage drop during a test interval is determined from the latched output of the switched comparator coupled to the lowest reference voltage. The setting and resetting of the latch can be gated through a selectable delay so as to discriminate for excursions that persist for a longer or shorter time.