Displaying 14 results from an estimated 14 matches for "irq_64".
2011 Feb 16
8
[PATCH] irq: Exclude percpu IRQs from being fixed up
...re-enables lock_kicker_irq and its irq handler is invoked which reports bug and crashes Dom0.
This patch sets IRQ_PER_CPU flag in irq desc and excludes percpu IRQs from being fixed up when taking CPUs down.
Signed-off-by: Fengzhe Zhang <fengzhe.zhang@intel.com>
diff --git a/arch/x86/kernel/irq_64.c b/arch/x86/kernel/irq_64.c
index 977d8b4..f0f9450 100644
--- a/arch/x86/kernel/irq_64.c
+++ b/arch/x86/kernel/irq_64.c
@@ -80,6 +80,9 @@ void fixup_irqs(void)
if (irq == 2)
continue;
+ if (desc->status & IRQ_PER_CPU)
+ continue;
+
/* interrupt''s are disabled at this...
2007 Nov 09
11
[PATCH 0/24] paravirt_ops for unified x86 - that's me again!
Hey folks,
Here's a new spin of the pvops64 patch series.
We didn't get that many comments from the last time,
so it should be probably almost ready to get in. Heya!
>From the last version, the most notable changes are:
* consolidation of system.h, merging jeremy's comments about ordering
concerns
* consolidation of smp functions that goes through smp_ops. They're sharing
2007 Nov 09
11
[PATCH 0/24] paravirt_ops for unified x86 - that's me again!
Hey folks,
Here's a new spin of the pvops64 patch series.
We didn't get that many comments from the last time,
so it should be probably almost ready to get in. Heya!
>From the last version, the most notable changes are:
* consolidation of system.h, merging jeremy's comments about ordering
concerns
* consolidation of smp functions that goes through smp_ops. They're sharing
2018 Feb 12
5
[PATCH] headers: untangle kmemleak.h from mm.h
...lease?
arch/powerpc/sysdev/dart_iommu.c | 1 +
arch/powerpc/sysdev/msi_bitmap.c | 1 +
arch/s390/kernel/nmi.c | 2 +-
arch/s390/kernel/smp.c | 1 -
arch/sparc/kernel/irq_64.c | 1 -
arch/x86/kernel/pci-dma.c | 1 -
drivers/iommu/exynos-iommu.c | 1 +
drivers/iommu/mtk_iommu_v1.c | 1 -
drivers/net/ethernet/ti/cpsw.c...
2018 Feb 12
5
[PATCH] headers: untangle kmemleak.h from mm.h
...lease?
arch/powerpc/sysdev/dart_iommu.c | 1 +
arch/powerpc/sysdev/msi_bitmap.c | 1 +
arch/s390/kernel/nmi.c | 2 +-
arch/s390/kernel/smp.c | 1 -
arch/sparc/kernel/irq_64.c | 1 -
arch/x86/kernel/pci-dma.c | 1 -
drivers/iommu/exynos-iommu.c | 1 +
drivers/iommu/mtk_iommu_v1.c | 1 -
drivers/net/ethernet/ti/cpsw.c...
2009 Jan 09
1
[PULL]: tip/cpus4096 updates
.../x86/include/asm/uv/uv_bau.h | 3 +-
arch/x86/kernel/cpu/intel_cacheinfo.c | 63 ++++++++++++++++-------
arch/x86/kernel/cpu/mcheck/mce_amd_64.c | 21 +++++---
arch/x86/kernel/io_apic.c | 20 ++++----
arch/x86/kernel/irq_32.c | 2 +-
arch/x86/kernel/irq_64.c | 2 +-
arch/x86/kernel/microcode_core.c | 74 ++++++++++++++++----------
arch/x86/kernel/tlb_32.c | 67 ++++++++++--------------
arch/x86/kernel/tlb_64.c | 62 ++++++++++++----------
arch/x86/kernel/tlb_uv.c | 16 +++--...
2009 Jan 09
1
[PULL]: tip/cpus4096 updates
.../x86/include/asm/uv/uv_bau.h | 3 +-
arch/x86/kernel/cpu/intel_cacheinfo.c | 63 ++++++++++++++++-------
arch/x86/kernel/cpu/mcheck/mce_amd_64.c | 21 +++++---
arch/x86/kernel/io_apic.c | 20 ++++----
arch/x86/kernel/irq_32.c | 2 +-
arch/x86/kernel/irq_64.c | 2 +-
arch/x86/kernel/microcode_core.c | 74 ++++++++++++++++----------
arch/x86/kernel/tlb_32.c | 67 ++++++++++--------------
arch/x86/kernel/tlb_64.c | 62 ++++++++++++----------
arch/x86/kernel/tlb_uv.c | 16 +++--...
2017 Apr 15
1
[Bug 100691] New: [4.10] BUG: KASAN: use-after-free in drm_calc_vbltimestamp_from_scanoutpos+0x625/0x740
...130 (kernel/irq/handle.c:181)
? __handle_irq_event_percpu+0x630/0x630 (kernel/irq/handle.c:136)
? handle_edge_irq+0x30/0x850 (kernel/irq/chip.c:622)
handle_irq_event+0xa7/0x140 (kernel/irq/handle.c:195)
handle_edge_irq+0x1cd/0x850 (kernel/irq/chip.c:622)
handle_irq+0x105/0x2a0 (arch/x86/kernel/irq_64.c:69)
? __local_bh_enable+0x37/0x60 (kernel/softirq.c:139)
do_IRQ+0x7d/0x1a0 (arch/x86/kernel/irq.c:213)
common_interrupt+0x90/0x90 (arch/x86/entry/entry_64.S:452)
RIP: 0010:cpuidle_enter_state+0x10d/0x7d0 (drivers/cpuidle/cpuidle.c:188)
RSP: 0018:ffff88077228fdc0 EFLAGS: 00000202 ORIG_RAX: ffff...
2007 Oct 31
5
[PATCH 0/7] (Re-)introducing pvops for x86_64 - Real pvops work part
Hey folks,
This is the part-of-pvops-implementation-that-is-not-exactly-a-merge. Neat,
uh? This is the majority of the work.
The first patch in the series does not really belong here. It was already
sent to lkml separetedly before, but I'm including it again, for a very
simple reason: Try to test the paravirt patches without it, and you'll fail
miserably ;-) (and it was not yet
2007 Oct 31
5
[PATCH 0/7] (Re-)introducing pvops for x86_64 - Real pvops work part
Hey folks,
This is the part-of-pvops-implementation-that-is-not-exactly-a-merge. Neat,
uh? This is the majority of the work.
The first patch in the series does not really belong here. It was already
sent to lkml separetedly before, but I'm including it again, for a very
simple reason: Try to test the paravirt patches without it, and you'll fail
miserably ;-) (and it was not yet
2007 Dec 04
10
[PATCH 0/10] Integrate msr.h
Hello,
This series of patches integrates msr.h header.
What it really does, is a series of steps to allow us
to get rid of duplicate code between i386 and x86_64 versions
With this done, achieving paravirt for x86_64 gets really easy,
just a couple of extra code.
The first patch was already sent a while ago, but was not yet pushed
to any tree , to my knowledge. So it is sent again. Also,
2007 Dec 04
10
[PATCH 0/10] Integrate msr.h
Hello,
This series of patches integrates msr.h header.
What it really does, is a series of steps to allow us
to get rid of duplicate code between i386 and x86_64 versions
With this done, achieving paravirt for x86_64 gets really easy,
just a couple of extra code.
The first patch was already sent a while ago, but was not yet pushed
to any tree , to my knowledge. So it is sent again. Also,
2008 Nov 13
69
[PATCH 00 of 38] xen: add more Xen dom0 support
Hi Ingo,
Here''s the chunk of patches to add Xen Dom0 support (it''s probably
worth creating a new xen/dom0 topic branch for it).
A dom0 Xen domain is basically the same as a normal domU domain, but
it has extra privileges to directly access hardware. There are two
issues to deal with:
- translating to and from the domain''s pseudo-physical addresses and
real machine
2013 Oct 06
40
[xen] double fault: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
Greetings,
I got the below dmesg and the first bad commit is
commit cf39c8e5352b4fb9efedfe7e9acb566a85ed847c
Merge: 3398d25 23b7eaf
Author: Linus Torvalds <torvalds@linux-foundation.org>
Date: Wed Sep 4 17:45:39 2013 -0700
Merge tag ''stable/for-linus-3.12-rc0-tag'' of git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip
Pull Xen updates from Konrad