Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp6571969ybv; Wed, 12 Feb 2020 15:09:07 -0800 (PST) X-Google-Smtp-Source: APXvYqx2/pKOgKmAHTY5bZRAKuWJ6Yu3y05vcwKUK+LEz9L1kejU9GX3sHO8gZjrhOkPwG4dPoa7 X-Received: by 2002:a05:6830:4b9:: with SMTP id l25mr11432019otd.266.1581548947725; Wed, 12 Feb 2020 15:09:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581548947; cv=none; d=google.com; s=arc-20160816; b=wbMQkC/FOzHIR8mPPbDEfM0SSt8xXoY8QHW7o0XF9d8TbWMhJLWGcX1I9ukMykBfDz xcLlFtGnvQ24N8SXUFLEN0yghj4YkGYyw3t/P9WW93S5M4bnCbxOfi1MIwEF0ZGR8DV1 PJ17vd31wTZtj4nHfBxABUEP07vMQgFcD4kFjKH+Sl0g7NvjtkUhDDAEUjYmXvChTqSw tmd1pq6LsVnOloMGeYuyunAdhm/Ig50w7UwUGOPVIGMKqN42IScX/Q7YiBE5vc7YpDsI SB2nq6rix/BC2h9vueOeJgmhQAcFFv5XZm6p1u9brI/p9ZEPGbWpilrHpAw00PwFkYtP DGvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=hvZeHKBB0qLJdbAu6wGVESu6kJFFTZqnxs6mB6Hl4dY=; b=UehFrFTbAJ78pfJ9Pi0ZMqoN3etl8d1Gg7EL/nrUR3Jlv2Hp1ePuKV2fu26M0sXox9 PP1yIX4szyl9HQ+r+Vz4G7p7iuhiBwSnE1t+Hd7yolH5N4kcieQlVAZ8lGPe4yiaAne1 PRbmZb7cHLuD6zLS0SChOJE7HE1xh6oXm5YT4Z1wJDlW0NvCq+QWrMwTzHg10s2tYMAH k574HGc0gy+0Ge/9OyWI0Hb8CFiRhyYKQSdbFKT76IWGZE+vU+B8KVTTI5V+Uv+gyaIp 4kWerg2CeA9lMLeDzNvBgGHQaCHMgdcBmI4yofLUb0ymm9Z3c0KtyshwSVlqfobIcYzp n+Rg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o16si100573otp.289.2020.02.12.15.08.33; Wed, 12 Feb 2020 15:09:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729103AbgBLXIS (ORCPT + 99 others); Wed, 12 Feb 2020 18:08:18 -0500 Received: from mga07.intel.com ([134.134.136.100]:34712 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727692AbgBLXIR (ORCPT ); Wed, 12 Feb 2020 18:08:17 -0500 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 12 Feb 2020 15:08:17 -0800 X-IronPort-AV: E=Sophos;i="5.70,434,1574150400"; d="scan'208";a="256980416" Received: from agluck-desk2.sc.intel.com (HELO agluck-desk2.amr.corp.intel.com) ([10.3.52.68]) by fmsmga004-auth.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 12 Feb 2020 15:08:17 -0800 Date: Wed, 12 Feb 2020 15:08:15 -0800 From: "Luck, Tony" To: Borislav Petkov Cc: x86@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH 0/5] New way to track mce notifier chain actions Message-ID: <20200212230815.GA3217@agluck-desk2.amr.corp.intel.com> References: <20200212204652.1489-1-tony.luck@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200212204652.1489-1-tony.luck@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Feb 12, 2020 at 12:46:47PM -0800, Tony Luck wrote: > Part 4 is where things are interesting and need a great deal more > thought. A bunch of things on the chain return NOTIFY_STOP which > prevents anything else on the chain from being run. For the moment > I ignored that semantic and added code everywhere to set the BIT > even though nobody else will see it. This is because I think at > least some of them should NOT be NOTIFY_STOP. NOTIFY_STOP is just one mechanism for preventing every function on the mce chain from reporting an error. The other bit I'd like to reconsider is edac_get_report_status(). Back in the day we seemed to be paranoid about reporting the same error more than once via all the different reporting mechanisms. Since then I've had to track down numerous "Why didn't this error get reported?" questions that frequently resolved to "It was reported, but not in the place that you expected". So now my attitude is "Let's just log it everywhere in so that whatever log the user is checking, they'll find the error". -Tony