From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 65D4FC433F5 for ; Tue, 19 Oct 2021 15:05:26 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 2BACA6115A for ; Tue, 19 Oct 2021 15:05:26 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 2BACA6115A Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:Message-ID: Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:References: List-Owner; bh=tMnCgXFv3+t5m5Kq+aZFHIDdwYGoTgROaHIFmGIl5mI=; b=pa86VMPnC1w2J6 IbHEZ7NH2XVD5ese7l/EWiPV1PZxB9f8ozFMNy8YQevvi7g+XK5pzgf4XrXZvMYnG0FRPlb90rc3G FafhUt2r+1cWZY+Q0FZeRi7n/eW5Hvf3KIv/hTg+5MQZJ1DTQEW5uO5BUwBSAQn90euYqDqjIk2F5 ZCMwtyTW5YfIpd/liFrlFYDvUxmUMiwZ7Vp9x5j1nwpHJ02YyFNAh//loz0rD9tbG1k3rSSVV5NE7 rcHQM4aMYVwLoGn4V0xZ9hbVCmn7GUsidM8uXHHGsKNkMvZNhNe0Nu/ihnORUNdFmwS3D9gNLkBjA ajhvPfl8Fghjc3O8kfXQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1mcqex-001cRx-Hn; Tue, 19 Oct 2021 15:04:11 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1mcqet-001cQo-T8 for linux-arm-kernel@lists.infradead.org; Tue, 19 Oct 2021 15:04:09 +0000 Received: by mail.kernel.org (Postfix) with ESMTPSA id 2A7236115A; Tue, 19 Oct 2021 15:04:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1634655847; bh=32/zovTwFvkouc5ENTCs/No8X0J+VVtCWoVWVN/axmc=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=iVieWef4zRJ55PGvCXzCgoZ15DMW3c4x6eUSJHyoDEnTHZpJARctM/82MuAIPp3is v5pyHzulp6iaq7Rrd8CSjMCZzbvigsR+rGlqkau36HC2vttzNkLvloO8E32g/7T2W3 YEJ8ZcNHDlCEiZyc0s2OeE6ZEH0w8VDymDxirkkfKtLTCZBDYsomFv9pKQlzjGTu58 oPvd5K9NOpdVFb3c1dBeG5F4WZNy0BZ2KVlm8t75yy7NImAkokLqZbkFFkpsSa0Z+c JqYmsYG338e/4dU7QOoCEnSxfQo42KvFCxwIE0s1ctaAVEnT3+59U/REyN1UbHNBJM Jb0E3qzfn/S6A== Date: Tue, 19 Oct 2021 10:04:05 -0500 From: Bjorn Helgaas To: Xuesong Chen Cc: catalin.marinas@arm.com, lorenzo.pieralisi@arm.com, james.morse@arm.com, will@kernel.org, rafael@kernel.org, tony.luck@intel.com, bp@alien8.de, mingo@kernel.org, bhelgaas@google.com, linux-pci@vger.kernel.org, linux-acpi@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3 2/2] ACPI: APEI: Filter the PCI MCFG address with an arch-agnostic method Message-ID: <20211019150405.GA2338201@bhelgaas> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20211019_080407_979053_AAC3DC88 X-CRM114-Status: GOOD ( 20.76 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Tue, Oct 19, 2021 at 12:50:33PM +0800, Xuesong Chen wrote: > The commit d91525eb8ee6 ("ACPI, EINJ: Enhance error injection tolerance > level") fixes the issue that the ACPI/APEI can not access the PCI MCFG > address on x86 platform, but this issue can also happen on other > architectures, for instance, we got below error message on arm64 platform: > ... > APEI: Can not request [mem 0x50100000-0x50100003] for APEI EINJ Trigger registers > ... > > This patch will try to handle this case in a more common way instead of the > original 'arch' specific solution, which will be beneficial to all the > APEI-dependent platforms after that. > > Signed-off-by: Xuesong Chen > Reported-by: kernel test robot The purpose of this patch is not to fix a problem reported by the kernel test robot, so remove this tag. I know the robot found a problem with a previous version of this patch, but we treat that the same as a code review comment. We normally don't explicitly credit reviewers unless it was something major, and then it would go in the commit log, not a "Reported-by" tag. It makes sense to credit the kernel test robot for things found in Linus' tree, but it's a little too aggressive about suggesting the tag for problems with unmerged changes. > Reviewed-by: Lorenzo Pieralisi This tag can only be added when Lorenzo explicitly supplies it himself. I do not see that on the mailing list, so please remove this tag as well. After Lorenzo supplies it, you can include it in future postings as long as you don't make significant changes to the patch. Bjorn _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel