Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753163AbbKLUBJ (ORCPT ); Thu, 12 Nov 2015 15:01:09 -0500 Received: from mga09.intel.com ([134.134.136.24]:36882 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752757AbbKLUBI (ORCPT ); Thu, 12 Nov 2015 15:01:08 -0500 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.20,283,1444719600"; d="scan'208";a="849779877" Date: Thu, 12 Nov 2015 12:01:07 -0800 From: "Luck, Tony" To: Ingo Molnar Cc: Borislav Petkov , linux-kernel@vger.kernel.org, linux-edac@vger.kernel.org, x86@kernel.org Subject: Re: [PATCH 3/3] x86, ras: Add mcsafe_memcpy() function to recover from machine checks Message-ID: <20151112200106.GA32073@agluck-desk.sc.intel.com> References: <02ef9e0e0b73591aa8ec37aae2409274d108af60.1447093569.git.tony.luck@intel.com> <20151112075313.GA5984@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20151112075313.GA5984@gmail.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 822 Lines: 20 On Thu, Nov 12, 2015 at 08:53:13AM +0100, Ingo Molnar wrote: > > +extern phys_addr_t mcsafe_memcpy(void *dst, const void __user *src, > > + unsigned size); > > So what's the longer term purpose, where will mcsafe_memcpy() be used? The initial plan is to use this for file systems backed by NVDIMMs. They will have a large amount of memory, and we have a practical recovery path - return -EIO just like legacy h/w. We can look for other places in the kernel where we read large amounts of memory and have some idea how to recover if the memory turns out to be bad. -Tony -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/