[PATCH 0/2] [Maveric] SRU: Fix CPU feature detection to stop stack dump

Tim Gardner tim.gardner at canonical.com
Wed Oct 6 15:37:35 UTC 2010


On 10/06/2010 03:46 PM, Colin King wrote:
> From: Colin Ian King<colin.king at canonical.com>
>
> BugLink: http://bugs.launchpad.net/bugs/615153 and
> https://bugzilla.kernel.org/show_bug.cgi?id=16322
>
> SRU Justification:
>
> Impact: Booting and suspend/resuming causes an kernel warning and a
> subsequent kernel stack dump on some machines with CPU features
> such as ARAT.
>
> Fix: Some CPU features such as ARAT are needed in early boot so
> that x86_init function pointers can be set up properly. Also the
> CPU feature detection code has to be re-run after uncapping the CPUID
> level.
>
> Testcase: Without the patches, booting and suspend/resuming causes the
> error: WARNING: at /build/buildd/linux-maverick-2.6.35/arch/x86/include \
> /asm/processor.h:1005 read_measured_perf_ctrs+0x6c/0x80(), and a kernel
> stack dump.  With the patches, boot and resume don't get produce the warning
> or stack dump.
>
> This is a cherrypick of upstream commits:
>    d900329e20f4476db6461752accebcf7935a8055 and
>    1dedefd1a066a795a87afca9c0236e1a94de9bf6
>
> H. Peter Anvin (1):
>    x86, cpu: After uncapping CPUID, re-run CPU feature detection
>
> Jacob Pan (1):
>    x86: detect scattered cpuid features earlier
>
>   arch/x86/kernel/cpu/common.c |    4 ++--
>   arch/x86/kernel/cpu/cpu.h    |    1 +
>   arch/x86/kernel/cpu/intel.c  |    1 +
>   3 files changed, 4 insertions(+), 2 deletions(-)
>
>

Both of these are targeted for stable. Is the severity of the warning 
sufficient to warrant a pre-stable patch?

-- 
Tim Gardner tim.gardner at canonical.com




More information about the kernel-team mailing list