similar to: [PATCH 1/4] ACPI: eliminate duplicate MADT parsing and unused SBF definitions

Displaying 8 results from an estimated 8 matches similar to: "[PATCH 1/4] ACPI: eliminate duplicate MADT parsing and unused SBF definitions"

2013 Oct 30
1
[PATCH] x86/ACPI/x2APIC: guard against out of range ACPI or APIC IDs
Other than for the legacy APIC, the x2APIC MADT entries have valid ranges possibly extending beyond what our internal arrays can handle, and hence we need to guard ourselves against corrupting memory here. Signed-off-by: Jan Beulich <jbeulich@suse.com> --- a/xen/arch/x86/acpi/boot.c +++ b/xen/arch/x86/acpi/boot.c @@ -97,7 +97,20 @@ acpi_parse_x2apic(struct acpi_subtable_h
2011 Mar 31
0
[PATCH 7/7] x86: cleanup bogus CONFIG_ACPI_PCI uses
We''re building for one case (CONFIG_ACPI_PCI defined) only, yet still had the other case''s code in there. Additionally there was quite a bit of pseudo-duplication between disabled(!) DMI scan and ACPI boot code. acpi_pci_disabled had only a single reader, which is off by default (i.e. must be enable on the command line), so it seems pointless to keep it. Signed-off-by: Jan
2005 Mar 24
0
[patch] small accounting and lockup fix for xenfreebsd on -unstable
# This is a BitKeeper generated diff -Nru style patch. # # ChangeSet # 2005/03/23 18:27:49-08:00 kmacy@shemp.lab.netapp.com # only bump tmpindex by NKPT-1 once # release sched lock on upcall # Signed-off-by: Kip Macy <kmacy@fsmware.com> # # freebsd-5.3-xen-sparse/i386-xen/i386-xen/machdep.c # 2005/03/23 18:24:47-08:00 kmacy@shemp.lab.netapp.com +0 -4 # remove extra bump of
2012 Nov 07
0
[PATCH v2] x86/ACPI: invalidate BGRT if necessary
Since the image pointed to may live in boot services memory (which we add to the global memory pool long before ACPI tables get looked at), we should prevent Dom0 from trying to retrieve the image data in that case. The alternatives would be to - not add boot services memory to the global pool at all, or - defer adding boot services memory until Dom0 indicates it is safe to do so, or - find and
2010 Aug 20
0
[PATCH 1/2] Implement APEI ERST feature to Xen
Implement APEI ERST feature to Xen APEI are ACPI4.0 new features. It consists of ERST, BERT, HEST, and EINJ. ERST is used to save fault error log to a platform persistent storage, so that when reboot os can retrieve the error log and handle it. This patch is used to implement ERST feature to Xen. It consists of 3-level hierarchy: operation level, action level, and instruction level. Instruction
2012 Nov 05
2
[PATCH] x86/ACPI: invalidate BGRT
Since the image pointed to may (and generally will) live in boot services memory (which we add to the global memory pool long before ACPI tables get looked at), we should prevent Dom0 from trying to retrieve the image data. The alternatives would be to - not add boot services memory to the global pool at all, or - defer adding boot services memory until Dom0 indicates it is safe to do so, or -
2006 Apr 28
2
[PATCH 1/2] Make physdev_op common
Signed-off-by Kevin Tian <kevin.tian@intel.com> Thanks, Kevin _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2008 Jan 08
6
What current Dell Systems are supported/work
Sorry for the repost... I don't think the first one posted.. posted to freebsd.stable, freebsd-current, Freebsd-hardware I checked the hardware in the online documentation manual/hardware It only lists the bits and peices of the machine say the hard drive controller and so forth. but doesn't give you a particular system to look at as a working machine with FreeBSD 6.2 does anybody