linux-stable/drivers/acpi/apei
Tony Luck ab59c89396 ACPI, APEI, EINJ: Refuse to inject into the zero page
Some validation tests dynamically inject errors into memory used by
applications to check that the system can recover from a variety of
poison consumption sceenarios.

But sometimes the virtual address picked by these tests is mapped to
the zero page.

This causes additional unexpected machine checks as other processes that
map the zero page also consume the poison.

Disallow injection to the zero page.

Signed-off-by: Tony Luck <tony.luck@intel.com>
Signed-off-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
2022-04-22 16:52:27 +02:00
..
Kconfig ACPI / APEI: Switch NOTIFY_SEA to use the estatus queue 2019-02-07 23:10:45 +01:00
Makefile License cleanup: add SPDX GPL-2.0 license identifier to files with no license 2017-11-02 11:10:55 +01:00
apei-base.c ACPI, APEI: Use the correct variable for sizeof() 2022-03-22 18:52:21 +01:00
apei-internal.h License cleanup: add SPDX GPL-2.0 license identifier to files with no license 2017-11-02 11:10:55 +01:00
bert.c ACPI/APEI: Limit printable size of BERT table data 2022-03-09 19:40:13 +01:00
einj.c ACPI, APEI, EINJ: Refuse to inject into the zero page 2022-04-22 16:52:27 +02:00
erst-dbg.c ACPI: APEI: Fix missing ERST record id 2022-04-13 20:29:24 +02:00
erst.c ACPI: APEI: Fix missing ERST record id 2022-04-13 20:29:24 +02:00
ghes.c ACPI: APEI: rename ghes_init() with an "acpi_" prefix 2022-03-03 20:25:23 +01:00
hest.c ACPI: APEI: fix return value of __setup handlers 2022-03-08 19:43:39 +01:00