diff options
author | Glauber de Oliveira Costa <gcosta@redhat.com> | 2008-03-19 13:25:28 -0400 |
---|---|---|
committer | Ingo Molnar <mingo@elte.hu> | 2008-04-17 11:41:01 -0400 |
commit | 693d4b8a6429af7f2029df20a59e22f4d752e141 (patch) | |
tree | 512a24d553a31eedb5aa69a1382c861c13491ac5 /arch/x86/kernel/smpboot.c | |
parent | 904541e2f76bc3efe4cc9978b7adb3323ea8607e (diff) |
x86: do smp tainting checks in a separate function
It will ease integration for x86_64
Signed-off-by: Glauber Costa <gcosta@redhat.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Diffstat (limited to 'arch/x86/kernel/smpboot.c')
-rw-r--r-- | arch/x86/kernel/smpboot.c | 21 |
1 files changed, 19 insertions, 2 deletions
diff --git a/arch/x86/kernel/smpboot.c b/arch/x86/kernel/smpboot.c index 02427d1003d3..ddb94ef37789 100644 --- a/arch/x86/kernel/smpboot.c +++ b/arch/x86/kernel/smpboot.c | |||
@@ -45,10 +45,8 @@ unsigned char *trampoline_base = __va(SMP_TRAMPOLINE_BASE); | |||
45 | /* representing cpus for which sibling maps can be computed */ | 45 | /* representing cpus for which sibling maps can be computed */ |
46 | static cpumask_t cpu_sibling_setup_map; | 46 | static cpumask_t cpu_sibling_setup_map; |
47 | 47 | ||
48 | #ifdef CONFIG_X86_32 | ||
49 | /* Set if we find a B stepping CPU */ | 48 | /* Set if we find a B stepping CPU */ |
50 | int __cpuinitdata smp_b_stepping; | 49 | int __cpuinitdata smp_b_stepping; |
51 | #endif | ||
52 | 50 | ||
53 | static void __cpuinit smp_apply_quirks(struct cpuinfo_x86 *c) | 51 | static void __cpuinit smp_apply_quirks(struct cpuinfo_x86 *c) |
54 | { | 52 | { |
@@ -105,6 +103,25 @@ valid_k7: | |||
105 | #endif | 103 | #endif |
106 | } | 104 | } |
107 | 105 | ||
106 | void smp_checks(void) | ||
107 | { | ||
108 | if (smp_b_stepping) | ||
109 | printk(KERN_WARNING "WARNING: SMP operation may be unreliable" | ||
110 | "with B stepping processors.\n"); | ||
111 | |||
112 | /* | ||
113 | * Don't taint if we are running SMP kernel on a single non-MP | ||
114 | * approved Athlon | ||
115 | */ | ||
116 | if (tainted & TAINT_UNSAFE_SMP) { | ||
117 | if (cpus_weight(cpu_present_map)) | ||
118 | printk(KERN_INFO "WARNING: This combination of AMD" | ||
119 | "processors is not suitable for SMP.\n"); | ||
120 | else | ||
121 | tainted &= ~TAINT_UNSAFE_SMP; | ||
122 | } | ||
123 | } | ||
124 | |||
108 | /* | 125 | /* |
109 | * The bootstrap kernel entry code has set these up. Save them for | 126 | * The bootstrap kernel entry code has set these up. Save them for |
110 | * a given CPU | 127 | * a given CPU |