> > Please define "unhardened". Why aren't all drivers "hardened"? Most drivers _currently_ do not handle reading all f's (or -1) from hardware. Some drivers do handle some situations but definitely not all of them. Hardening a driver involves making the driver "-1" safe. Some companies do ship hardened drivers, but the ones in the tree are not hardened. [The above comment is in no way an approval of shipping drivers outside of the kernel. I'm just stating a fact.] The effort involved in hardening this drivers is significant. It will be a long time before anyone considers the in-tree drivers hardened. We should start with a baby-step of acknowledging the problem and giving current users a way of protecting their data. > >> In these cases, the system should not do a bus reset, but rather the >> system should panic to avoid any further possible data corruption. > > Really? You really want to panic the whole system and shut down and > potentially loose everything? That does not sound like a good idea at > all to me, is there really no way to recover from this? Yes, that's _exactly_ what I want to do. Having a driver that is capable of writing corrupted data to a disk or corrupting memory is much worse than panicking and stopping the system for a short period of time. The default is to handle an AER through a bus reset so a user must actively request the panic. P. -- To unsubscribe from this list: send the line "unsubscribe linux-pci" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html