x86/mm/pat: Don't report PAT on CPUs that don't support it
[linux/fpc-iii.git] / arch / sparc / include / asm / pil.h
blob522b43db2ed336a5d34dee17b4e8c3b593e6ee5d
1 #ifndef _SPARC64_PIL_H
2 #define _SPARC64_PIL_H
4 /* To avoid some locking problems, we hard allocate certain PILs
5 * for SMP cross call messages that must do a etrap/rtrap.
7 * A local_irq_disable() does not block the cross call delivery, so
8 * when SMP locking is an issue we reschedule the event into a PIL
9 * interrupt which is blocked by local_irq_disable().
11 * In fact any XCALL which has to etrap/rtrap has a problem because
12 * it is difficult to prevent rtrap from running BH's, and that would
13 * need to be done if the XCALL arrived while %pil==PIL_NORMAL_MAX.
15 * Finally, in order to handle profiling events even when a
16 * local_irq_disable() is in progress, we only disable up to level 14
17 * interrupts. Profile counter overflow interrupts arrive at level
18 * 15.
20 #define PIL_SMP_CALL_FUNC 1
21 #define PIL_SMP_RECEIVE_SIGNAL 2
22 #define PIL_SMP_CAPTURE 3
23 #define PIL_DEVICE_IRQ 5
24 #define PIL_SMP_CALL_FUNC_SNGL 6
25 #define PIL_DEFERRED_PCR_WORK 7
26 #define PIL_KGDB_CAPTURE 8
27 #define PIL_NORMAL_MAX 14
28 #define PIL_NMI 15
30 #endif /* !(_SPARC64_PIL_H) */