aboutsummaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/cpu/mcheck
diff options
context:
space:
mode:
authorDan Williams <dan.j.williams@intel.com>2018-07-13 21:50:27 -0700
committerDave Jiang <dave.jiang@intel.com>2018-08-20 09:22:45 -0700
commit510ee090abc3dbc862bd35f5f3d8b7284a9117b4 (patch)
treed2df0a6b7bc544752629f55255c8823dc3884d90 /arch/x86/kernel/cpu/mcheck
parentmm, memory_failure: Teach memory_failure() about dev_pagemap pages (diff)
downloadlinux-dev-510ee090abc3dbc862bd35f5f3d8b7284a9117b4.tar.xz
linux-dev-510ee090abc3dbc862bd35f5f3d8b7284a9117b4.zip
x86/mm/pat: Prepare {reserve, free}_memtype() for "decoy" addresses
In preparation for using set_memory_uc() instead set_memory_np() for isolating poison from speculation, teach the memtype code to sanitize physical addresses vs __PHYSICAL_MASK. The motivation for using set_memory_uc() for this case is to allow ongoing access to persistent memory pages via the pmem-driver + memcpy_mcsafe() until the poison is repaired. Cc: Thomas Gleixner <tglx@linutronix.de> Cc: Ingo Molnar <mingo@redhat.com> Cc: "H. Peter Anvin" <hpa@zytor.com> Cc: Tony Luck <tony.luck@intel.com> Cc: Borislav Petkov <bp@alien8.de> Cc: <linux-edac@vger.kernel.org> Cc: <x86@kernel.org> Signed-off-by: Dan Williams <dan.j.williams@intel.com> Acked-by: Ingo Molnar <mingo@redhat.com> Signed-off-by: Dave Jiang <dave.jiang@intel.com>
Diffstat (limited to 'arch/x86/kernel/cpu/mcheck')
0 files changed, 0 insertions, 0 deletions