Displaying 2 results from an estimated 2 matches for "lapic_flags".
2013 Oct 30
1
[PATCH] x86/ACPI/x2APIC: guard against out of range ACPI or APIC IDs
.../* Record local apic id only when enabled and fitting. */
+ if (processor->local_apic_id >= MAX_APICS ||
+ processor->uid >= MAX_MADT_ENTRIES) {
+ printk("%sAPIC ID %#x and/or ACPI ID %#x beyond limit"
+ " - processor ignored\n",
+ processor->lapic_flags & ACPI_MADT_ENABLED ?
+ KERN_WARNING "WARNING: " : KERN_INFO,
+ processor->local_apic_id, processor->uid);
+ /*
+ * Must not return an error here, to prevent
+ * acpi_table_parse_entries() from terminating early.
+ */
+ return 0 /* -ENOSPC */;
+ }
if (proces...
2011 Dec 12
0
[PATCH 1/4] ACPI: eliminate duplicate MADT parsing and unused SBF definitions
...apic);
- lsapic[i].acpi_id = i;
+ lsapic[i].header.type = ACPI_MADT_TYPE_LOCAL_SAPIC;
+ lsapic[i].header.length = sizeof(lsapic[i]);
+ lsapic[i].processor_id = i;
lsapic[i].id = i;
lsapic[i].eid = 0;
if (xen_ia64_is_vcpu_allocated(d, i)) {
- lsapic[i].flags.enabled = 1;
+ lsapic[i].lapic_flags = ACPI_MADT_ENABLED;
nbr_cpus++;
}
}
madt->header.length = sizeof(struct acpi_table_madt) +
- nbr_cpus * sizeof(struct acpi_table_lsapic);
+ nbr_cpus * sizeof(*lsapic);
madt->header.checksum = -acpi_tb_checksum((u8*)madt,
madt-...