From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759794Ab1ENA4b (ORCPT ); Fri, 13 May 2011 20:56:31 -0400 Received: from mail-vx0-f174.google.com ([209.85.220.174]:41360 "EHLO mail-vx0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751381Ab1ENA4a convert rfc822-to-8bit (ORCPT ); Fri, 13 May 2011 20:56:30 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=uvKhqMFq4P08BzqGVzXiNHptKH/GzItZEAZ18u1wIIeuu9Db0GLrjSoxzKFH1ILs65 k/m36LPfYrDvwm/aHPhjb/cZXfVjwv2U9+lLaBOX/BZ6RFmE3IdO1sxxAYtJXlUPcI3A oLmXVSXCXdMlfL8YOPQDHi6f6FU1qvOSXX8Ls= MIME-Version: 1.0 In-Reply-To: <20110513152033.GB3854@elte.hu> References: <1305275018-20596-1-git-send-email-ying.huang@intel.com> <20110513124523.GM13984@redhat.com> <20110513130011.GA6474@elte.hu> <20110513152033.GB3854@elte.hu> Date: Sat, 14 May 2011 08:56:29 +0800 Message-ID: Subject: Re: [RFC] x86, NMI, Treat unknown NMI as hardware error From: huang ying To: Ingo Molnar Cc: Don Zickus , Huang Ying , linux-kernel@vger.kernel.org, Andi Kleen , Robert Richter , Andi Kleen , Borislav Petkov Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 13, 2011 at 11:20 PM, Ingo Molnar wrote: > > * huang ying wrote: > >> > What should be done instead is to add an event for unknown NMIs, which can >> > then be processed by the RAS daemon to implement policy. >> > >> > By using 'active' event filters it could even be set on a system to panic >> > the box by default. >> >> If there is real fatal hardware error, maybe we have no luxury to go from NMI >> handler to user space RAS daemon to determine what to do. System may explode, >> bad data may go to disk before that. > > That is why i suggested: > >  > > By using 'active' event filters it could even be set on a system to panic >  > > the box by default. > > event filters are evaluated in the kernel, so the panic could be instantaneous, > without the event having to reach user-space. Yes. If we do that in kernel, that should be doable. Does 'active' event filters have much difference with DIE_UNKNOWNNMI notifier chain? What can we get from the added complexity? What do you think is the better way to determine go panic on unknown NMI or not? Best Regards, Huang Ying