Re: [Fastboot] Re: [PATCH 1/4] stack overflow safe kdump (i386) -safe_smp_processor_id

From: Eric W. Biederman
Date: Mon Nov 28 2005 - 23:16:54 EST


Andi Kleen <ak@xxxxxxx> writes:

> Fernando Luis Vazquez Cao <fernando@xxxxxxxxxxxxxxxxx> writes:
>>
>> To circumvent this problem I suggest implementing
>> "safe_smp_processor_id()" (it already exists on x86_64) for i386 and
>> IA64 and use it as a replacement to smp_processor_id in the reboot path
>> to the dump capture kernel. This is a possible implementation for i386.
>
> It's not fully safe, because a SMP kernel might run on a 32bit
> system without APIC. Then hard_smp_processor_id() would fault.
> (this cannot happen on x86-64)
>
> You probably need to check one of the globals set by apic.c
> when its disabled.

Right. An SMP kernel on a uniprocessor, without apics.

To my knowledge all SMP systems that linux supports have
apics.

Eric

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/