Re: [PATCH v8 7/7] arm64: kvm: handle SError Interrupt by categorization

2017-12-15 Thread gengdongjiu
[...] > >> + case ESR_ELx_AET_UER: /* The error has not been propagated */ >> + /* >> + * Userspace only handle the guest SError Interrupt(SEI) if the >> + * error has not been propagated >> + */ >> + run->exit_reason =

Re: [PATCH v8 7/7] arm64: kvm: handle SError Interrupt by categorization

2017-12-15 Thread gengdongjiu
Hi James, On 2017/12/16 2:52, James Morse wrote: >> signal, it will record the CPER and trigger a IRQ to notify guest, as shown >> below: >> >> SIGBUS_MCEERR_AR trigger Synchronous External Abort. >> SIGBUS_MCEERR_AO trigger GPIO IRQ. >> >> For the SIGBUS_MCEERR_AO and SIGBUS_MCEERR_AR, we have

[PATCH] cgroup, docs: document the root cgroup behavior of cpu and io controllers

2017-12-15 Thread Maciej S. Szmigiero
Currently, cgroups v2 documentation contains only a generic remark that "How resource consumption in the root cgroup is governed is up to each controller", which isn't really telling users much, who need to dig in the code and / or commit messages to learn the exact behavior. In cgroups v1 at

[PATCH v4] MIPS: Add noexec=on|off kernel parameter

2017-12-15 Thread Aleksandar Markovic
From: Miodrag Dinic Add a new kernel parameter to override the default behavior related to the decision whether to set up stack as non-executable in function mips_elf_read_implies_exec(). The new parameter is used to control non executable stack and heap, regardless of

Re: [PATCH v8 7/7] arm64: kvm: handle SError Interrupt by categorization

2017-12-15 Thread James Morse
Hi gengdongjiu, On 07/12/17 06:37, gengdongjiu wrote: > I understand you most idea. > > But In the Qemu one signal type can only correspond to one behavior, can not > correspond to two behaviors, > otherwise Qemu will do not know how to do. > > For the Qemu, if it receives the SIGBUS_MCEERR_AR

Re: [PATCH 0/3] kbuild,kconfig: generate lexer/parser C files instead of copying _shipped files

2017-12-15 Thread Sam Ravnborg
Hi Masahiro. > > In Linux build system convention, pre-generated files are version- > > controlled with a "_shipped" suffix. During the kernel building, > > they are simply shipped (copied) removing the suffix. > > > > From users' point of view, this approach can reduce external tool > >

[PATCH v8 0/8] Intel SGX Driver

2017-12-15 Thread Jarkko Sakkinen
Intel(R) SGX is a set of CPU instructions that can be used by applications to set aside private regions of code and data. The code outside the enclave is disallowed to access the memory inside the enclave by the CPU access control. In a way you can think that SGX provides inverted sandbox. It

[PATCH v8 6/8] intel_sgx: driver documentation

2017-12-15 Thread Jarkko Sakkinen
Signed-off-by: Jarkko Sakkinen Tested-by: Serge Ayoun --- Documentation/index.rst | 1 + Documentation/x86/intel_sgx.rst | 101 2 files changed, 102 insertions(+) create mode 100644