diff options
author | Jay Lan <jlan@sgi.com> | 2006-12-11 15:39:23 -0800 |
---|---|---|
committer | Tony Luck <tony.luck@intel.com> | 2006-12-12 10:09:39 -0800 |
commit | adf142e379bd20ad906a7e36f722eaabb3b44b0c (patch) | |
tree | bcd0e2054bdaf023e211169bd46bb334b6cdcb11 /CREDITS | |
parent | 3640543df26fd38f31f0c6decc35c07be2a6307c (diff) | |
download | kernel-crypto-adf142e379bd20ad906a7e36f722eaabb3b44b0c.tar.gz kernel-crypto-adf142e379bd20ad906a7e36f722eaabb3b44b0c.tar.xz kernel-crypto-adf142e379bd20ad906a7e36f722eaabb3b44b0c.zip |
[IA64] Do not call SN_SAL_SET_CPU_NUMBER twice on cpu 0
This is an SN specific patch.
Architectually, cpu_init is always called twice on cpu 0
and thus resulted in two SN_SAL_SET_CPU_NUMBER calls.
This was harmless in production kernel; however, it can
cause problem on booting up a crashdump kernel at Altix.
Here is the patch that detects the second sn_cpu_init
call and skips the second call to SN_SAL_SET_CPU_NUMBER.
Signed-Off-By: Jay Lan <jlan@sgi.com>
Signed-off-by: Tony Luck <tony.luck@intel.com>
Diffstat (limited to 'CREDITS')
0 files changed, 0 insertions, 0 deletions