From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752782AbeD2Gh6 (ORCPT ); Sun, 29 Apr 2018 02:37:58 -0400 Received: from mail-wm0-f66.google.com ([74.125.82.66]:52483 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752631AbeD2Gh5 (ORCPT ); Sun, 29 Apr 2018 02:37:57 -0400 X-Google-Smtp-Source: AB8JxZoAbuOwJq5yhRfSJiDQQ1Bn1FZY8oK2nO1icmb3i1UYXPJBGxwqf1Wy7turX51Fk0rFA4YD03SVnvxRQZl339o= MIME-Version: 1.0 In-Reply-To: References: <1516190084-18978-1-git-send-email-julien.thierry@arm.com> From: Joel Fernandes Date: Sat, 28 Apr 2018 23:37:55 -0700 Message-ID: Subject: Re: [PATCH v2 0/6] arm64: provide pseudo NMI with GICv3 To: Julien Thierry Cc: Linux ARM Kernel List , Linux Kernel Mailing List , mark.rutland@arm.com, marc.zyngier@arm.com, james.morse@arm.com, daniel.thompson@linaro.org, Joel Fernandes Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 17, 2018 at 4:10 AM, Julien Thierry wrote: > Hi, > > On 17/01/18 11:54, Julien Thierry wrote: >> >> This series is a continuation of the work started by Daniel [1]. The goal >> is to use GICv3 interrupt priorities to simulate an NMI. >> > > > I have submitted a separate series making use of this feature for the ARM > PMUv3 interrupt [1]. I guess the hard lockup detector using NMI could be a nice next step to see how well it works with lock up detection. That's the main usecase for my interest. However, perf profiling is also a strong one. thanks, - Joel