On Wed, 7 Feb 2001, H. Peter Anvin wrote:

> Why is the test there in the first place?  If the machine has an APIC, it
> should be able to use it.  Presumably no other CPU uses the same MSR
> address (am I wrong?) for anything else -- if so, it should be able to
> poke it as long as the kernel intercepts the #GP(0) that may come if it
> is not enabled.  The Linux kernel has pretty sophisticated support for
> trapping faults.

 The point is whether it is safe to enable the local APIC that was
disabled by BIOS on an unknown CPU.  Probably yes, but who knows -- we
might need additional setup to be performed for interrupts to work. 

> In other words, I'd like to see a reason for making any vendor-specific
> determinations, and if so, they should ideally be centralized to the CPU
> feature-determination code.

 It would be hard to decide how to classify it.  It's something like "the
CPU has a local APIC that we know how to handle in the non-MPS system". 

 It might be viable just to delete the test altogether, though and just
trap #GP(0) on the MSR access.  For the sake of simplicity.  If a problem
with a system ever arizes, we may handle it then.

 Note that we still have to choose appropriate vendor-specific PeMo
handling and an event for the NMI watchdog anyway.

  Maciej

-- 
+  Maciej W. Rozycki, Technical University of Gdansk, Poland   +
+--------------------------------------------------------------+
+        e-mail: [EMAIL PROTECTED], PGP key available        +

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/

Reply via email to