search for: irq_64

Displaying 14 results from an estimated 14 matches for "irq_64".

2011 Feb 16
8
[PATCH] irq: Exclude percpu IRQs from being fixed up
...re-enables lock_kicker_irq and its irq handler is invoked which reports bug and crashes Dom0. This patch sets IRQ_PER_CPU flag in irq desc and excludes percpu IRQs from being fixed up when taking CPUs down. Signed-off-by: Fengzhe Zhang <fengzhe.zhang@intel.com> diff --git a/arch/x86/kernel/irq_64.c b/arch/x86/kernel/irq_64.c index 977d8b4..f0f9450 100644 --- a/arch/x86/kernel/irq_64.c +++ b/arch/x86/kernel/irq_64.c @@ -80,6 +80,9 @@ void fixup_irqs(void) if (irq == 2) continue; + if (desc->status & IRQ_PER_CPU) + continue; + /* interrupt''s are disabled at this...
2007 Nov 09
11
[PATCH 0/24] paravirt_ops for unified x86 - that's me again!
Hey folks, Here's a new spin of the pvops64 patch series. We didn't get that many comments from the last time, so it should be probably almost ready to get in. Heya! >From the last version, the most notable changes are: * consolidation of system.h, merging jeremy's comments about ordering concerns * consolidation of smp functions that goes through smp_ops. They're sharing
2007 Nov 09
11
[PATCH 0/24] paravirt_ops for unified x86 - that's me again!
Hey folks, Here's a new spin of the pvops64 patch series. We didn't get that many comments from the last time, so it should be probably almost ready to get in. Heya! >From the last version, the most notable changes are: * consolidation of system.h, merging jeremy's comments about ordering concerns * consolidation of smp functions that goes through smp_ops. They're sharing
2018 Feb 12
5
[PATCH] headers: untangle kmemleak.h from mm.h
...lease? arch/powerpc/sysdev/dart_iommu.c | 1 + arch/powerpc/sysdev/msi_bitmap.c | 1 + arch/s390/kernel/nmi.c | 2 +- arch/s390/kernel/smp.c | 1 - arch/sparc/kernel/irq_64.c | 1 - arch/x86/kernel/pci-dma.c | 1 - drivers/iommu/exynos-iommu.c | 1 + drivers/iommu/mtk_iommu_v1.c | 1 - drivers/net/ethernet/ti/cpsw.c...
2018 Feb 12
5
[PATCH] headers: untangle kmemleak.h from mm.h
...lease? arch/powerpc/sysdev/dart_iommu.c | 1 + arch/powerpc/sysdev/msi_bitmap.c | 1 + arch/s390/kernel/nmi.c | 2 +- arch/s390/kernel/smp.c | 1 - arch/sparc/kernel/irq_64.c | 1 - arch/x86/kernel/pci-dma.c | 1 - drivers/iommu/exynos-iommu.c | 1 + drivers/iommu/mtk_iommu_v1.c | 1 - drivers/net/ethernet/ti/cpsw.c...
2009 Jan 09
1
[PULL]: tip/cpus4096 updates
.../x86/include/asm/uv/uv_bau.h | 3 +- arch/x86/kernel/cpu/intel_cacheinfo.c | 63 ++++++++++++++++------- arch/x86/kernel/cpu/mcheck/mce_amd_64.c | 21 +++++--- arch/x86/kernel/io_apic.c | 20 ++++---- arch/x86/kernel/irq_32.c | 2 +- arch/x86/kernel/irq_64.c | 2 +- arch/x86/kernel/microcode_core.c | 74 ++++++++++++++++---------- arch/x86/kernel/tlb_32.c | 67 ++++++++++-------------- arch/x86/kernel/tlb_64.c | 62 ++++++++++++---------- arch/x86/kernel/tlb_uv.c | 16 +++--...
2009 Jan 09
1
[PULL]: tip/cpus4096 updates
.../x86/include/asm/uv/uv_bau.h | 3 +- arch/x86/kernel/cpu/intel_cacheinfo.c | 63 ++++++++++++++++------- arch/x86/kernel/cpu/mcheck/mce_amd_64.c | 21 +++++--- arch/x86/kernel/io_apic.c | 20 ++++---- arch/x86/kernel/irq_32.c | 2 +- arch/x86/kernel/irq_64.c | 2 +- arch/x86/kernel/microcode_core.c | 74 ++++++++++++++++---------- arch/x86/kernel/tlb_32.c | 67 ++++++++++-------------- arch/x86/kernel/tlb_64.c | 62 ++++++++++++---------- arch/x86/kernel/tlb_uv.c | 16 +++--...
2017 Apr 15
1
[Bug 100691] New: [4.10] BUG: KASAN: use-after-free in drm_calc_vbltimestamp_from_scanoutpos+0x625/0x740
...130 (kernel/irq/handle.c:181) ? __handle_irq_event_percpu+0x630/0x630 (kernel/irq/handle.c:136) ? handle_edge_irq+0x30/0x850 (kernel/irq/chip.c:622) handle_irq_event+0xa7/0x140 (kernel/irq/handle.c:195) handle_edge_irq+0x1cd/0x850 (kernel/irq/chip.c:622) handle_irq+0x105/0x2a0 (arch/x86/kernel/irq_64.c:69) ? __local_bh_enable+0x37/0x60 (kernel/softirq.c:139) do_IRQ+0x7d/0x1a0 (arch/x86/kernel/irq.c:213) common_interrupt+0x90/0x90 (arch/x86/entry/entry_64.S:452) RIP: 0010:cpuidle_enter_state+0x10d/0x7d0 (drivers/cpuidle/cpuidle.c:188) RSP: 0018:ffff88077228fdc0 EFLAGS: 00000202 ORIG_RAX: ffff...
2007 Oct 31
5
[PATCH 0/7] (Re-)introducing pvops for x86_64 - Real pvops work part
Hey folks, This is the part-of-pvops-implementation-that-is-not-exactly-a-merge. Neat, uh? This is the majority of the work. The first patch in the series does not really belong here. It was already sent to lkml separetedly before, but I'm including it again, for a very simple reason: Try to test the paravirt patches without it, and you'll fail miserably ;-) (and it was not yet
2007 Oct 31
5
[PATCH 0/7] (Re-)introducing pvops for x86_64 - Real pvops work part
Hey folks, This is the part-of-pvops-implementation-that-is-not-exactly-a-merge. Neat, uh? This is the majority of the work. The first patch in the series does not really belong here. It was already sent to lkml separetedly before, but I'm including it again, for a very simple reason: Try to test the paravirt patches without it, and you'll fail miserably ;-) (and it was not yet
2007 Dec 04
10
[PATCH 0/10] Integrate msr.h
Hello, This series of patches integrates msr.h header. What it really does, is a series of steps to allow us to get rid of duplicate code between i386 and x86_64 versions With this done, achieving paravirt for x86_64 gets really easy, just a couple of extra code. The first patch was already sent a while ago, but was not yet pushed to any tree , to my knowledge. So it is sent again. Also,
2007 Dec 04
10
[PATCH 0/10] Integrate msr.h
Hello, This series of patches integrates msr.h header. What it really does, is a series of steps to allow us to get rid of duplicate code between i386 and x86_64 versions With this done, achieving paravirt for x86_64 gets really easy, just a couple of extra code. The first patch was already sent a while ago, but was not yet pushed to any tree , to my knowledge. So it is sent again. Also,
2008 Nov 13
69
[PATCH 00 of 38] xen: add more Xen dom0 support
Hi Ingo, Here''s the chunk of patches to add Xen Dom0 support (it''s probably worth creating a new xen/dom0 topic branch for it). A dom0 Xen domain is basically the same as a normal domU domain, but it has extra privileges to directly access hardware. There are two issues to deal with: - translating to and from the domain''s pseudo-physical addresses and real machine
2013 Oct 06
40
[xen] double fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
Greetings, I got the below dmesg and the first bad commit is commit cf39c8e5352b4fb9efedfe7e9acb566a85ed847c Merge: 3398d25 23b7eaf Author: Linus Torvalds <torvalds@linux-foundation.org> Date: Wed Sep 4 17:45:39 2013 -0700 Merge tag ''stable/for-linus-3.12-rc0-tag'' of git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip Pull Xen updates from Konrad