2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* linux/include/asm-i386/nmi.h
|
|
|
|
*/
|
|
|
|
#ifndef ASM_NMI_H
|
|
|
|
#define ASM_NMI_H
|
|
|
|
|
|
|
|
#include <linux/pm.h>
|
2006-12-07 01:14:01 +00:00
|
|
|
#include <asm/irq.h>
|
|
|
|
|
|
|
|
#ifdef ARCH_HAS_NMI_WATCHDOG
|
2006-06-26 11:57:01 +00:00
|
|
|
|
|
|
|
/**
|
2006-09-26 08:52:27 +00:00
|
|
|
* do_nmi_callback
|
2005-04-16 22:20:36 +00:00
|
|
|
*
|
2006-09-26 08:52:27 +00:00
|
|
|
* Check to see if a callback exists and execute it. Return 1
|
|
|
|
* if the handler exists and was handled successfully.
|
2005-04-16 22:20:36 +00:00
|
|
|
*/
|
2006-09-26 08:52:27 +00:00
|
|
|
int do_nmi_callback(struct pt_regs *regs, int cpu);
|
2006-06-26 11:57:01 +00:00
|
|
|
|
2006-09-26 08:52:27 +00:00
|
|
|
extern int nmi_watchdog_enabled;
|
2006-09-26 08:52:26 +00:00
|
|
|
extern int avail_to_resrv_perfctr_nmi_bit(unsigned int);
|
|
|
|
extern int avail_to_resrv_perfctr_nmi(unsigned int);
|
|
|
|
extern int reserve_perfctr_nmi(unsigned int);
|
|
|
|
extern void release_perfctr_nmi(unsigned int);
|
|
|
|
extern int reserve_evntsel_nmi(unsigned int);
|
|
|
|
extern void release_evntsel_nmi(unsigned int);
|
|
|
|
|
2006-09-26 08:52:26 +00:00
|
|
|
extern void setup_apic_nmi_watchdog (void *);
|
2006-09-26 08:52:27 +00:00
|
|
|
extern void stop_apic_nmi_watchdog (void *);
|
2006-06-26 11:57:01 +00:00
|
|
|
extern void disable_timer_nmi_watchdog(void);
|
|
|
|
extern void enable_timer_nmi_watchdog(void);
|
2006-09-26 08:52:26 +00:00
|
|
|
extern int nmi_watchdog_tick (struct pt_regs * regs, unsigned reason);
|
2006-06-26 11:57:01 +00:00
|
|
|
|
2006-09-26 08:52:26 +00:00
|
|
|
extern atomic_t nmi_active;
|
2006-06-26 11:57:01 +00:00
|
|
|
extern unsigned int nmi_watchdog;
|
[PATCH] disable NMI watchdog by default
there's a new NMI watchdog related problem: KVM crashes on certain
bzImages because ... we enable the NMI watchdog by default (even if the
user does not ask for it) , and no other OS on this planet does that so
KVM doesnt have emulation for that yet. So KVM injects a #GP, which
crashes the Linux guest:
general protection fault: 0000 [#1]
PREEMPT SMP
Modules linked in:
CPU: 0
EIP: 0060:[<c011a8ae>] Not tainted VLI
EFLAGS: 00000246 (2.6.20-rc5-rt0 #3)
EIP is at setup_apic_nmi_watchdog+0x26d/0x3d3
and no, i did /not/ request an nmi_watchdog on the boot command line!
Solution: turn off that darn thing! It's a debug tool, not a 'make life
harder' tool!!
with this patch the KVM guest boots up just fine.
And with this my laptop (Lenovo T60) also stopped its sporadic hard
hanging (sometimes in acpi_init(), sometimes later during bootup,
sometimes much later during actual use) as well. It hung with both
nmi_watchdog=1 and nmi_watchdog=2, so it's generally the fact of NMI
injection that is causing problems, not the NMI watchdog variant, nor
any particular bootup code.
[ NMI breaks on some systems, esp in combination with SMM -Arjan ]
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Acked-by: Arjan van de Ven <arjan@linux.intel.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-03-05 12:20:11 +00:00
|
|
|
#define NMI_DEFAULT 0
|
2006-06-26 11:57:01 +00:00
|
|
|
#define NMI_NONE 0
|
|
|
|
#define NMI_IO_APIC 1
|
|
|
|
#define NMI_LOCAL_APIC 2
|
|
|
|
#define NMI_INVALID 3
|
|
|
|
|
2006-09-29 23:47:55 +00:00
|
|
|
struct ctl_table;
|
|
|
|
struct file;
|
|
|
|
extern int proc_nmi_enabled(struct ctl_table *, int , struct file *,
|
|
|
|
void __user *, size_t *, loff_t *);
|
|
|
|
extern int unknown_nmi_panic;
|
|
|
|
|
2006-12-07 01:14:01 +00:00
|
|
|
void __trigger_all_cpu_backtrace(void);
|
|
|
|
#define trigger_all_cpu_backtrace() __trigger_all_cpu_backtrace()
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
#endif /* ASM_NMI_H */
|