diff options
author | Dan Williams <dan.j.williams@intel.com> | 2018-07-13 21:50:32 -0700 |
---|---|---|
committer | Dave Jiang <dave.jiang@intel.com> | 2018-08-20 09:22:45 -0700 |
commit | 284ce4011ba60d6c487b668eea729b6294930806 (patch) | |
tree | f0f3fbbd78d266f9983d69b29453cb3817f7fb27 /arch/riscv/Kconfig | |
parent | 510ee090abc3dbc862bd35f5f3d8b7284a9117b4 (diff) | |
download | linux-284ce4011ba60d6c487b668eea729b6294930806.tar.gz linux-284ce4011ba60d6c487b668eea729b6294930806.tar.bz2 linux-284ce4011ba60d6c487b668eea729b6294930806.zip |
x86/memory_failure: Introduce {set, clear}_mce_nospec()
Currently memory_failure() returns zero if the error was handled. On
that result mce_unmap_kpfn() is called to zap the page out of the kernel
linear mapping to prevent speculative fetches of potentially poisoned
memory. However, in the case of dax mapped devmap pages the page may be
in active permanent use by the device driver, so it cannot be unmapped
from the kernel.
Instead of marking the page not present, marking the page UC should
be sufficient for preventing poison from being pre-fetched into the
cache. Convert mce_unmap_pfn() to set_mce_nospec() remapping the page as
UC, to hide it from speculative accesses.
Given that that persistent memory errors can be cleared by the driver,
include a facility to restore the page to cacheable operation,
clear_mce_nospec().
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: <linux-edac@vger.kernel.org>
Cc: <x86@kernel.org>
Acked-by: Tony Luck <tony.luck@intel.com>
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Acked-by: Ingo Molnar <mingo@redhat.com>
Signed-off-by: Dave Jiang <dave.jiang@intel.com>
Diffstat (limited to 'arch/riscv/Kconfig')
0 files changed, 0 insertions, 0 deletions