[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <SJ1PR11MB60834039F485FEBC8031398AFCD6A@SJ1PR11MB6083.namprd11.prod.outlook.com>
Date: Tue, 17 Oct 2023 01:24:53 +0000
From: "Luck, Tony" <tony.luck@...el.com>
To: "Li, Zhiquan1" <zhiquan1.li@...el.com>,
Borislav Petkov <bp@...en8.de>
CC: "x86@...nel.org" <x86@...nel.org>,
"linux-edac@...r.kernel.org" <linux-edac@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"patches@...ts.linux.dev" <patches@...ts.linux.dev>,
"mingo@...nel.org" <mingo@...nel.org>,
"naoya.horiguchi@....com" <naoya.horiguchi@....com>
Subject: RE: [PATCH v3] x86/mce: Set PG_hwpoison page flag to avoid the
capture kernel panic
> I understand what you mean. Looks I didn't express myself well on this
> point and caused ambiguity. Maybe removing the attributive clause would
> make it brief and clear? Such as,
>
> For some MCE fatal error cases, the kernel might call
> mce_panic() to terminate the production kernel directly, there
> is no opportunity to queue a task for calling memory_failure().
How about:
When there is a fatal machine check Linux calls mce_panic()
without checking to see if bad data at some memory address
was reported in the machine check banks.
If kexec is enabled, check for memory errors and mark the
page as poisoned so that the kexec'd kernel can avoid accessing
the page.
-Tony
Powered by blists - more mailing lists