diff options
author | Dan Williams <dan.j.williams@intel.com> | 2018-05-01 16:49:45 +0300 |
---|---|---|
committer | Dan Williams <dan.j.williams@intel.com> | 2018-05-23 09:18:31 +0300 |
commit | 5d8beee20d89e34ff1dcb0da84adf7607858c59d (patch) | |
tree | 8ec057691e285c7244b82bc47b077fa0ce50fae5 /drivers/acpi/acpi_lpat.c | |
parent | 6dfdb2b6d877d654c8c7b59d7166f4d672fba4e8 (diff) | |
download | linux-5d8beee20d89e34ff1dcb0da84adf7607858c59d.tar.xz |
x86, nfit_test: Add unit test for memcpy_mcsafe()
Given the fact that the ACPI "EINJ" (error injection) facility is not
universally available, implement software infrastructure to validate the
memcpy_mcsafe() exception handling implementation.
For each potential read exception point in memcpy_mcsafe(), inject a
emulated exception point at the address identified by 'mcsafe_inject'
variable. With this infrastructure implement a test to validate that the
'bytes remaining' calculation is correct for a range of various source
buffer alignments.
This code is compiled out by default. The CONFIG_MCSAFE_DEBUG
configuration symbol needs to be manually enabled by editing
Kconfig.debug. I.e. this functionality can not be accidentally enabled
by a user / distro, it's only for development.
Cc: <x86@kernel.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Tony Luck <tony.luck@intel.com>
Cc: Al Viro <viro@zeniv.linux.org.uk>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Andy Lutomirski <luto@amacapital.net>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Reported-by: Tony Luck <tony.luck@intel.com>
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Diffstat (limited to 'drivers/acpi/acpi_lpat.c')
0 files changed, 0 insertions, 0 deletions