Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966198AbbLPRI2 (ORCPT ); Wed, 16 Dec 2015 12:08:28 -0500 Received: from mail-wm0-f41.google.com ([74.125.82.41]:35343 "EHLO mail-wm0-f41.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965782AbbLPRI0 (ORCPT ); Wed, 16 Dec 2015 12:08:26 -0500 From: Daniel Thompson To: Russell King Cc: Daniel Thompson , Marc Zyngier , Thomas Gleixner , Jason Cooper , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, patches@linaro.org, linaro-kernel@lists.linaro.org Subject: [PATCH 0/2] Fix NMI backtrace for Inforce IFC6410 Date: Wed, 16 Dec 2015 17:08:04 +0000 Message-Id: <1450285686-844-1-git-send-email-daniel.thompson@linaro.org> X-Mailer: git-send-email 2.5.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1037 Lines: 27 After spotting some problems with the SysRq-L on Inforce IFC6410 I ran some tests (see patch 2) and concluded that certain SGI IDs cannot be used by Linux on these platforms because they have been reserved for use by the secure world. This patchset includes both a patch to resolve the problem on Inforce IFC6410 and a patch to detect and report reserved SGI IDs during boot. The patch (deliberately) keeps quiet on platforms where the kernel's world is not subject to any restrictions. Daniel Thompson (2): arm: Fix "NMI" backtrace for Inforce IFC6410 irqchip/gic: Identify and report any reserved SGI IDs arch/arm/kernel/smp.c | 3 ++- drivers/irqchip/irq-gic.c | 53 +++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 55 insertions(+), 1 deletion(-) -- 2.5.0 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/