summaryrefslogtreecommitdiff
path: root/drivers/acpi/pci_root.c
diff options
context:
space:
mode:
authorTony Luck <tony.luck@intel.com>2022-04-20 00:19:21 +0300
committerRafael J. Wysocki <rafael.j.wysocki@intel.com>2022-04-22 17:52:27 +0300
commitab59c89396c007c360b1a4d762732d1621ff5456 (patch)
treea8dda876419c7a5189c32ce64440075534869f2e /drivers/acpi/pci_root.c
parenta090931524d03a4975c84b89a32210420d852313 (diff)
downloadlinux-ab59c89396c007c360b1a4d762732d1621ff5456.tar.xz
ACPI, APEI, EINJ: Refuse to inject into the zero page
Some validation tests dynamically inject errors into memory used by applications to check that the system can recover from a variety of poison consumption sceenarios. But sometimes the virtual address picked by these tests is mapped to the zero page. This causes additional unexpected machine checks as other processes that map the zero page also consume the poison. Disallow injection to the zero page. Signed-off-by: Tony Luck <tony.luck@intel.com> Signed-off-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
Diffstat (limited to 'drivers/acpi/pci_root.c')
0 files changed, 0 insertions, 0 deletions