From: Xie XiuQi <xiexiuqi@huawei.com>
To: christoffer.dall@linaro.org, marc.zyngier@arm.com,
catalin.marinas@arm.com, will.deacon@arm.com,
james.morse@arm.com, fu.wei@linaro.org, rostedt@goodmis.org,
hanjun.guo@linaro.org, shiju.jose@huawei.com
Cc: wuquanming@huawei.com, kvm@vger.kernel.org,
linux-kernel@vger.kernel.org, gengdongjiu@huawei.com,
wangxiongfeng2@huawei.com, linux-acpi@vger.kernel.org,
zhengqiang10@huawei.com, kvmarm@lists.cs.columbia.edu,
linux-arm-kernel@lists.infradead.org
Subject: [PATCH v3 0/8] arm64: acpi: apei: handle SEI notification type for ARMv8
Date: Thu, 30 Mar 2017 18:31:00 +0800 [thread overview]
Message-ID: <1490869877-118713-1-git-send-email-xiexiuqi@huawei.com> (raw)
ARM APEI extension proposal added SEI (asynchronous SError interrupt)
notification type for ARMv8.
Add a new GHES error source handling function for SEI. In firmware
first mode, if an error source's notification type is SEI. Then GHES
could parse and report the detail error information.
In firmware first mode, we could assume:
1) The ghes for sei is a global table, firmware should report one sei at a time.
2) SEI is masked while exception is processing
3) SEI may interrupt while irq handler is running
4) SEA may interrupt while SEI handler is running
So, the memory area used to transfer hardware error information from
BIOS to Linux can be determined only in NMI, SEI(arm64), IRQ or timer
handler. We add a virtual page for SEI context.
Error Synchronization Barrier (ESB; part of the ARMv8.2 Extensions)
is used to synchronize Unrecoverable errors. That is, containable errors
architecturally consumed by the PE and not silently propagated.
With ESB it is generally possible to isolate an unrecoverable error
between two ESB instructions. So, it's possible to recovery from
unrecoverable errors reported by asynchronous SError interrupt.
Since SEI is asynchronous, a SEI generated on user process may propagate
to another user process via shared memory, which may cause unrecoverable.
We have a idea which only recover sei from user process which has no
writable shared memory.
The idea is still in the discussion, any comments is welcome.
This series is based on Tyler's series "[PATCH V13 00/10] Add UEFI 2.6 and ACPI 6.1 updates
for RAS on ARM64" and the latest mainline.
v3: add ARM processor error information trace event
add a per-cpu variable to indecate sei is processing
remove nmi_{enter/exit} protection for ghes_notify_sei()
reserve a virtual page for processing ghes table in SEI context
don't always inject vabt for sei
serprate do_sei from bad_mode
add esb which make recovery from sei possible
add an idea to recovery from sei for shared memory process
v2: add kvm guest SEI notification support
add nmi_{entry, exit} to protect ghes_notify_sei
https://lkml.org/lkml/2017/3/7/962
https://lkml.org/lkml/2017/3/3/189
Wang Xiongfeng (1):
arm64: exception: check shared writable page in SEI handler
Xie XiuQi (7):
trace: ras: add ARM processor error information trace event
acpi: apei: handle SEI notification type for ARMv8
arm64: apei: add a per-cpu variable to indecate sei is processing
APEI: GHES: reserve a virtual page for SEI context
arm64: KVM: add guest SEI support
arm64: RAS: add ras extension runtime detection
arm64: exception: handle asynchronous SError interrupt
arch/arm64/Kconfig | 16 +++
arch/arm64/include/asm/cpucaps.h | 3 +-
arch/arm64/include/asm/esr.h | 14 +++
arch/arm64/include/asm/sysreg.h | 2 +
arch/arm64/include/asm/system_misc.h | 1 +
arch/arm64/kernel/cpufeature.c | 11 ++
arch/arm64/kernel/entry.S | 70 ++++++++++-
arch/arm64/kernel/traps.c | 217 +++++++++++++++++++++++++++++++++++
arch/arm64/kvm/handle_exit.c | 22 +++-
drivers/acpi/apei/Kconfig | 14 +++
drivers/acpi/apei/ghes.c | 166 +++++++++++++++++++--------
include/acpi/ghes.h | 3 +
include/linux/cper.h | 5 +
include/ras/ras_event.h | 87 ++++++++++++++
14 files changed, 575 insertions(+), 56 deletions(-)
--
1.8.3.1
WARNING: multiple messages have this Message-ID (diff)
From: Xie XiuQi <xiexiuqi@huawei.com>
To: <christoffer.dall@linaro.org>, <marc.zyngier@arm.com>,
<catalin.marinas@arm.com>, <will.deacon@arm.com>,
<james.morse@arm.com>, <fu.wei@linaro.org>, <rostedt@goodmis.org>,
<hanjun.guo@linaro.org>, <shiju.jose@huawei.com>
Cc: <linux-arm-kernel@lists.infradead.org>,
<kvmarm@lists.cs.columbia.edu>, <kvm@vger.kernel.org>,
<linux-kernel@vger.kernel.org>, <linux-acpi@vger.kernel.org>,
<gengdongjiu@huawei.com>, <zhengqiang10@huawei.com>,
<wuquanming@huawei.com>, <xiexiuqi@huawei.com>,
<wangxiongfeng2@huawei.com>
Subject: [PATCH v3 0/8] arm64: acpi: apei: handle SEI notification type for ARMv8
Date: Thu, 30 Mar 2017 18:31:00 +0800 [thread overview]
Message-ID: <1490869877-118713-1-git-send-email-xiexiuqi@huawei.com> (raw)
ARM APEI extension proposal added SEI (asynchronous SError interrupt)
notification type for ARMv8.
Add a new GHES error source handling function for SEI. In firmware
first mode, if an error source's notification type is SEI. Then GHES
could parse and report the detail error information.
In firmware first mode, we could assume:
1) The ghes for sei is a global table, firmware should report one sei at a time.
2) SEI is masked while exception is processing
3) SEI may interrupt while irq handler is running
4) SEA may interrupt while SEI handler is running
So, the memory area used to transfer hardware error information from
BIOS to Linux can be determined only in NMI, SEI(arm64), IRQ or timer
handler. We add a virtual page for SEI context.
Error Synchronization Barrier (ESB; part of the ARMv8.2 Extensions)
is used to synchronize Unrecoverable errors. That is, containable errors
architecturally consumed by the PE and not silently propagated.
With ESB it is generally possible to isolate an unrecoverable error
between two ESB instructions. So, it's possible to recovery from
unrecoverable errors reported by asynchronous SError interrupt.
Since SEI is asynchronous, a SEI generated on user process may propagate
to another user process via shared memory, which may cause unrecoverable.
We have a idea which only recover sei from user process which has no
writable shared memory.
The idea is still in the discussion, any comments is welcome.
This series is based on Tyler's series "[PATCH V13 00/10] Add UEFI 2.6 and ACPI 6.1 updates
for RAS on ARM64" and the latest mainline.
v3: add ARM processor error information trace event
add a per-cpu variable to indecate sei is processing
remove nmi_{enter/exit} protection for ghes_notify_sei()
reserve a virtual page for processing ghes table in SEI context
don't always inject vabt for sei
serprate do_sei from bad_mode
add esb which make recovery from sei possible
add an idea to recovery from sei for shared memory process
v2: add kvm guest SEI notification support
add nmi_{entry, exit} to protect ghes_notify_sei
https://lkml.org/lkml/2017/3/7/962
https://lkml.org/lkml/2017/3/3/189
Wang Xiongfeng (1):
arm64: exception: check shared writable page in SEI handler
Xie XiuQi (7):
trace: ras: add ARM processor error information trace event
acpi: apei: handle SEI notification type for ARMv8
arm64: apei: add a per-cpu variable to indecate sei is processing
APEI: GHES: reserve a virtual page for SEI context
arm64: KVM: add guest SEI support
arm64: RAS: add ras extension runtime detection
arm64: exception: handle asynchronous SError interrupt
arch/arm64/Kconfig | 16 +++
arch/arm64/include/asm/cpucaps.h | 3 +-
arch/arm64/include/asm/esr.h | 14 +++
arch/arm64/include/asm/sysreg.h | 2 +
arch/arm64/include/asm/system_misc.h | 1 +
arch/arm64/kernel/cpufeature.c | 11 ++
arch/arm64/kernel/entry.S | 70 ++++++++++-
arch/arm64/kernel/traps.c | 217 +++++++++++++++++++++++++++++++++++
arch/arm64/kvm/handle_exit.c | 22 +++-
drivers/acpi/apei/Kconfig | 14 +++
drivers/acpi/apei/ghes.c | 166 +++++++++++++++++++--------
include/acpi/ghes.h | 3 +
include/linux/cper.h | 5 +
include/ras/ras_event.h | 87 ++++++++++++++
14 files changed, 575 insertions(+), 56 deletions(-)
--
1.8.3.1
WARNING: multiple messages have this Message-ID (diff)
From: Xie XiuQi <xiexiuqi@huawei.com>
To: <christoffer.dall@linaro.org>, <marc.zyngier@arm.com>,
<catalin.marinas@arm.com>, <will.deacon@arm.com>,
<james.morse@arm.com>, <fu.wei@linaro.org>, <rostedt@goodmis.org>,
<hanjun.guo@linaro.org>, <shiju.jose@huawei.com>
Cc: wuquanming@huawei.com, kvm@vger.kernel.org,
linux-kernel@vger.kernel.org, gengdongjiu@huawei.com,
wangxiongfeng2@huawei.com, linux-acpi@vger.kernel.org,
zhengqiang10@huawei.com, kvmarm@lists.cs.columbia.edu,
linux-arm-kernel@lists.infradead.org
Subject: [PATCH v3 0/8] arm64: acpi: apei: handle SEI notification type for ARMv8
Date: Thu, 30 Mar 2017 18:31:00 +0800 [thread overview]
Message-ID: <1490869877-118713-1-git-send-email-xiexiuqi@huawei.com> (raw)
ARM APEI extension proposal added SEI (asynchronous SError interrupt)
notification type for ARMv8.
Add a new GHES error source handling function for SEI. In firmware
first mode, if an error source's notification type is SEI. Then GHES
could parse and report the detail error information.
In firmware first mode, we could assume:
1) The ghes for sei is a global table, firmware should report one sei at a time.
2) SEI is masked while exception is processing
3) SEI may interrupt while irq handler is running
4) SEA may interrupt while SEI handler is running
So, the memory area used to transfer hardware error information from
BIOS to Linux can be determined only in NMI, SEI(arm64), IRQ or timer
handler. We add a virtual page for SEI context.
Error Synchronization Barrier (ESB; part of the ARMv8.2 Extensions)
is used to synchronize Unrecoverable errors. That is, containable errors
architecturally consumed by the PE and not silently propagated.
With ESB it is generally possible to isolate an unrecoverable error
between two ESB instructions. So, it's possible to recovery from
unrecoverable errors reported by asynchronous SError interrupt.
Since SEI is asynchronous, a SEI generated on user process may propagate
to another user process via shared memory, which may cause unrecoverable.
We have a idea which only recover sei from user process which has no
writable shared memory.
The idea is still in the discussion, any comments is welcome.
This series is based on Tyler's series "[PATCH V13 00/10] Add UEFI 2.6 and ACPI 6.1 updates
for RAS on ARM64" and the latest mainline.
v3: add ARM processor error information trace event
add a per-cpu variable to indecate sei is processing
remove nmi_{enter/exit} protection for ghes_notify_sei()
reserve a virtual page for processing ghes table in SEI context
don't always inject vabt for sei
serprate do_sei from bad_mode
add esb which make recovery from sei possible
add an idea to recovery from sei for shared memory process
v2: add kvm guest SEI notification support
add nmi_{entry, exit} to protect ghes_notify_sei
https://lkml.org/lkml/2017/3/7/962
https://lkml.org/lkml/2017/3/3/189
Wang Xiongfeng (1):
arm64: exception: check shared writable page in SEI handler
Xie XiuQi (7):
trace: ras: add ARM processor error information trace event
acpi: apei: handle SEI notification type for ARMv8
arm64: apei: add a per-cpu variable to indecate sei is processing
APEI: GHES: reserve a virtual page for SEI context
arm64: KVM: add guest SEI support
arm64: RAS: add ras extension runtime detection
arm64: exception: handle asynchronous SError interrupt
arch/arm64/Kconfig | 16 +++
arch/arm64/include/asm/cpucaps.h | 3 +-
arch/arm64/include/asm/esr.h | 14 +++
arch/arm64/include/asm/sysreg.h | 2 +
arch/arm64/include/asm/system_misc.h | 1 +
arch/arm64/kernel/cpufeature.c | 11 ++
arch/arm64/kernel/entry.S | 70 ++++++++++-
arch/arm64/kernel/traps.c | 217 +++++++++++++++++++++++++++++++++++
arch/arm64/kvm/handle_exit.c | 22 +++-
drivers/acpi/apei/Kconfig | 14 +++
drivers/acpi/apei/ghes.c | 166 +++++++++++++++++++--------
include/acpi/ghes.h | 3 +
include/linux/cper.h | 5 +
include/ras/ras_event.h | 87 ++++++++++++++
14 files changed, 575 insertions(+), 56 deletions(-)
--
1.8.3.1
WARNING: multiple messages have this Message-ID (diff)
From: xiexiuqi@huawei.com (Xie XiuQi)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v3 0/8] arm64: acpi: apei: handle SEI notification type for ARMv8
Date: Thu, 30 Mar 2017 18:31:00 +0800 [thread overview]
Message-ID: <1490869877-118713-1-git-send-email-xiexiuqi@huawei.com> (raw)
ARM APEI extension proposal added SEI (asynchronous SError interrupt)
notification type for ARMv8.
Add a new GHES error source handling function for SEI. In firmware
first mode, if an error source's notification type is SEI. Then GHES
could parse and report the detail error information.
In firmware first mode, we could assume:
1) The ghes for sei is a global table, firmware should report one sei at a time.
2) SEI is masked while exception is processing
3) SEI may interrupt while irq handler is running
4) SEA may interrupt while SEI handler is running
So, the memory area used to transfer hardware error information from
BIOS to Linux can be determined only in NMI, SEI(arm64), IRQ or timer
handler. We add a virtual page for SEI context.
Error Synchronization Barrier (ESB; part of the ARMv8.2 Extensions)
is used to synchronize Unrecoverable errors. That is, containable errors
architecturally consumed by the PE and not silently propagated.
With ESB it is generally possible to isolate an unrecoverable error
between two ESB instructions. So, it's possible to recovery from
unrecoverable errors reported by asynchronous SError interrupt.
Since SEI is asynchronous, a SEI generated on user process may propagate
to another user process via shared memory, which may cause unrecoverable.
We have a idea which only recover sei from user process which has no
writable shared memory.
The idea is still in the discussion, any comments is welcome.
This series is based on Tyler's series "[PATCH V13 00/10] Add UEFI 2.6 and ACPI 6.1 updates
for RAS on ARM64" and the latest mainline.
v3: add ARM processor error information trace event
add a per-cpu variable to indecate sei is processing
remove nmi_{enter/exit} protection for ghes_notify_sei()
reserve a virtual page for processing ghes table in SEI context
don't always inject vabt for sei
serprate do_sei from bad_mode
add esb which make recovery from sei possible
add an idea to recovery from sei for shared memory process
v2: add kvm guest SEI notification support
add nmi_{entry, exit} to protect ghes_notify_sei
https://lkml.org/lkml/2017/3/7/962
https://lkml.org/lkml/2017/3/3/189
Wang Xiongfeng (1):
arm64: exception: check shared writable page in SEI handler
Xie XiuQi (7):
trace: ras: add ARM processor error information trace event
acpi: apei: handle SEI notification type for ARMv8
arm64: apei: add a per-cpu variable to indecate sei is processing
APEI: GHES: reserve a virtual page for SEI context
arm64: KVM: add guest SEI support
arm64: RAS: add ras extension runtime detection
arm64: exception: handle asynchronous SError interrupt
arch/arm64/Kconfig | 16 +++
arch/arm64/include/asm/cpucaps.h | 3 +-
arch/arm64/include/asm/esr.h | 14 +++
arch/arm64/include/asm/sysreg.h | 2 +
arch/arm64/include/asm/system_misc.h | 1 +
arch/arm64/kernel/cpufeature.c | 11 ++
arch/arm64/kernel/entry.S | 70 ++++++++++-
arch/arm64/kernel/traps.c | 217 +++++++++++++++++++++++++++++++++++
arch/arm64/kvm/handle_exit.c | 22 +++-
drivers/acpi/apei/Kconfig | 14 +++
drivers/acpi/apei/ghes.c | 166 +++++++++++++++++++--------
include/acpi/ghes.h | 3 +
include/linux/cper.h | 5 +
include/ras/ras_event.h | 87 ++++++++++++++
14 files changed, 575 insertions(+), 56 deletions(-)
--
1.8.3.1
next reply other threads:[~2017-03-30 10:31 UTC|newest]
Thread overview: 139+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-03-30 10:31 Xie XiuQi [this message]
2017-03-30 10:31 ` [PATCH v3 0/8] arm64: acpi: apei: handle SEI notification type for ARMv8 Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 1/8] trace: ras: add ARM processor error information trace event Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 16:02 ` Steven Rostedt
2017-03-30 16:02 ` Steven Rostedt
2017-03-30 16:02 ` Steven Rostedt
2017-04-06 9:03 ` Xie XiuQi
2017-04-06 9:03 ` Xie XiuQi
2017-04-06 9:03 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 2/8] acpi: apei: handle SEI notification type for ARMv8 Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-31 16:20 ` James Morse
2017-03-31 16:20 ` James Morse
2017-04-06 9:11 ` Xie XiuQi
2017-04-06 9:11 ` Xie XiuQi
2017-04-06 9:11 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 3/8] arm64: apei: add a per-cpu variable to indecate sei is processing Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 4/8] APEI: GHES: reserve a virtual page for SEI context Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-31 16:22 ` James Morse
2017-03-31 16:22 ` James Morse
2017-04-06 9:25 ` Xie XiuQi
2017-04-06 9:25 ` Xie XiuQi
2017-04-06 9:25 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 5/8] arm64: KVM: add guest SEI support Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 6/8] arm64: RAS: add ras extension runtime detection Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 7/8] arm64: exception: handle asynchronous SError interrupt Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-04-13 8:44 ` Xiongfeng Wang
2017-04-13 8:44 ` Xiongfeng Wang
2017-04-13 8:44 ` Xiongfeng Wang
2017-04-13 10:51 ` Mark Rutland
2017-04-13 10:51 ` Mark Rutland
2017-04-13 10:51 ` Mark Rutland
2017-04-14 7:03 ` Xie XiuQi
2017-04-14 7:03 ` Xie XiuQi
2017-04-14 7:03 ` Xie XiuQi
2017-04-18 1:09 ` Xiongfeng Wang
2017-04-18 1:09 ` Xiongfeng Wang
2017-04-18 1:09 ` Xiongfeng Wang
2017-04-18 10:51 ` James Morse
2017-04-18 10:51 ` James Morse
2017-04-18 10:51 ` James Morse
2017-04-19 2:37 ` Xiongfeng Wang
2017-04-19 2:37 ` Xiongfeng Wang
2017-04-19 2:37 ` Xiongfeng Wang
2017-04-20 8:52 ` James Morse
2017-04-20 8:52 ` James Morse
2017-04-20 8:52 ` James Morse
2017-04-21 11:33 ` Xiongfeng Wang
2017-04-21 11:33 ` Xiongfeng Wang
2017-04-21 11:33 ` Xiongfeng Wang
2017-04-24 17:14 ` James Morse
2017-04-24 17:14 ` James Morse
2017-04-24 17:14 ` James Morse
2017-04-28 2:55 ` Xiongfeng Wang
2017-04-28 2:55 ` Xiongfeng Wang
2017-04-28 2:55 ` Xiongfeng Wang
2017-05-08 17:27 ` James Morse
2017-05-08 17:27 ` James Morse
2017-05-09 2:16 ` Xiongfeng Wang
2017-05-09 2:16 ` Xiongfeng Wang
2017-05-09 2:16 ` Xiongfeng Wang
2017-04-21 10:46 ` Xiongfeng Wang
2017-04-21 10:46 ` Xiongfeng Wang
2017-04-21 10:46 ` Xiongfeng Wang
2017-03-30 10:31 ` [PATCH v3 8/8] arm64: exception: check shared writable page in SEI handler Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-04-07 15:56 ` James Morse
2017-04-07 15:56 ` James Morse
2017-04-07 15:56 ` James Morse
2017-04-12 8:35 ` Xiongfeng Wang
2017-04-12 8:35 ` Xiongfeng Wang
2017-04-12 8:35 ` Xiongfeng Wang
2017-03-30 10:31 ` [PATCH v3 0/8] arm64: acpi: apei: handle SEI notification type for ARMv8 Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 1/8] trace: ras: add ARM processor error information trace event Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-04-14 20:36 ` Baicar, Tyler
2017-04-14 20:36 ` Baicar, Tyler
2017-04-17 3:08 ` Xie XiuQi
2017-04-17 3:08 ` Xie XiuQi
2017-04-17 3:08 ` Xie XiuQi
2017-04-17 3:16 ` Xie XiuQi
2017-04-17 3:16 ` Xie XiuQi
2017-04-17 3:16 ` Xie XiuQi
2017-04-17 17:18 ` Baicar, Tyler
2017-04-17 17:18 ` Baicar, Tyler
2017-04-18 2:22 ` Xie XiuQi
2017-04-18 2:22 ` Xie XiuQi
2017-04-18 2:22 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 2/8] acpi: apei: handle SEI notification type for ARMv8 Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 3/8] arm64: apei: add a per-cpu variable to indecate sei is processing Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 4/8] APEI: GHES: reserve a virtual page for SEI context Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 5/8] arm64: KVM: add guest SEI support Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 6/8] arm64: RAS: add ras extension runtime detection Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 7/8] arm64: exception: handle asynchronous SError interrupt Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` [PATCH v3 8/8] arm64: exception: check shared writable page in SEI handler Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
2017-03-30 10:31 ` Xie XiuQi
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1490869877-118713-1-git-send-email-xiexiuqi@huawei.com \
--to=xiexiuqi@huawei.com \
--cc=catalin.marinas@arm.com \
--cc=christoffer.dall@linaro.org \
--cc=fu.wei@linaro.org \
--cc=gengdongjiu@huawei.com \
--cc=hanjun.guo@linaro.org \
--cc=james.morse@arm.com \
--cc=kvm@vger.kernel.org \
--cc=kvmarm@lists.cs.columbia.edu \
--cc=linux-acpi@vger.kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kernel@vger.kernel.org \
--cc=marc.zyngier@arm.com \
--cc=rostedt@goodmis.org \
--cc=shiju.jose@huawei.com \
--cc=wangxiongfeng2@huawei.com \
--cc=will.deacon@arm.com \
--cc=wuquanming@huawei.com \
--cc=zhengqiang10@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.