From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-ob0-f171.google.com (mail-ob0-f171.google.com [209.85.214.171]) by kanga.kvack.org (Postfix) with ESMTP id 7B7E982F66 for ; Mon, 26 Oct 2015 10:56:11 -0400 (EDT) Received: by obcqt19 with SMTP id qt19so144140709obc.3 for ; Mon, 26 Oct 2015 07:56:11 -0700 (PDT) Received: from g1t6223.austin.hp.com (g1t6223.austin.hp.com. [15.73.96.124]) by mx.google.com with ESMTPS id a6si9060432obl.83.2015.10.26.07.56.10 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Oct 2015 07:56:10 -0700 (PDT) Message-ID: <1445871136.20657.81.camel@hpe.com> Subject: Re: [PATCH v2 3/3] ACPI/APEI/EINJ: Allow memory error injection to NVDIMM From: Toshi Kani Date: Mon, 26 Oct 2015 08:52:16 -0600 In-Reply-To: <20151025104512.GC6084@nazgul.tnic> References: <1445626439-8424-1-git-send-email-toshi.kani@hpe.com> <1445626439-8424-4-git-send-email-toshi.kani@hpe.com> <20151025104512.GC6084@nazgul.tnic> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: Borislav Petkov Cc: akpm@linux-foundation.org, dan.j.williams@intel.com, rjw@rjwysocki.net, linux-mm@kvack.org, linux-nvdimm@lists.01.org, linux-acpi@vger.kernel.org, linux-kernel@vger.kernel.org On Sun, 2015-10-25 at 11:45 +0100, Borislav Petkov wrote: > On Fri, Oct 23, 2015 at 12:53:59PM -0600, Toshi Kani wrote: > > In the case of memory error injection, einj_error_inject() checks > > if a target address is regular RAM. Update this check to add a call > > to region_intersects_pmem() to verify if a target address range is > > NVDIMM. This allows injecting a memory error to both RAM and NVDIMM > > for testing. > > > > Also, the current RAM check, page_is_ram(), is replaced with > > region_intersects_ram() so that it can verify a target address > > range with the requested size. > > > > Signed-off-by: Toshi Kani > > --- > > drivers/acpi/apei/einj.c | 12 ++++++++---- > > 1 file changed, 8 insertions(+), 4 deletions(-) > > ... > > > @@ -545,10 +545,14 @@ static int einj_error_inject(u32 type, u32 flags, u64 param1, > > u64 param2, > > /* > > * Disallow crazy address masks that give BIOS leeway to pick > > * injection address almost anywhere. Insist on page or > > - * better granularity and that target address is normal RAM. > > + * better granularity and that target address is normal RAM or > > + * NVDIMM. > > */ > > - pfn = PFN_DOWN(param1 & param2); > > - if (!page_is_ram(pfn) || ((param2 & PAGE_MASK) != PAGE_MASK)) > > + base_addr = param1 & param2; > > + size = (~param2) + 1; > > Just a minor nitpick: please separate assignments from the if-statement > here with a \n. Sure. I will send an updated patch for 3/3, "[PATCH v2 UPDATE 3/3]". Thanks, -Toshi -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org