Merge branch 'x86-boot-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 boot updates from Ingo Molnar: "Two cleanups and a bugfix for a rare boot option combination" * 'x86-boot-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/boot/KASLR: Remove return value from handle_mem_options() x86/corruption-check: Use pr_*() instead of printk() x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided
This commit is contained in:
@@ -1,4 +1,7 @@
|
||||
// SPDX-License-Identifier: GPL-2.0
|
||||
|
||||
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
||||
|
||||
#include <linux/init.h>
|
||||
#include <linux/sched.h>
|
||||
#include <linux/kthread.h>
|
||||
@@ -31,11 +34,17 @@ static __init int set_corruption_check(char *arg)
|
||||
ssize_t ret;
|
||||
unsigned long val;
|
||||
|
||||
if (!arg) {
|
||||
pr_err("memory_corruption_check config string not provided\n");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
ret = kstrtoul(arg, 10, &val);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
memory_corruption_check = val;
|
||||
|
||||
return 0;
|
||||
}
|
||||
early_param("memory_corruption_check", set_corruption_check);
|
||||
@@ -45,6 +54,11 @@ static __init int set_corruption_check_period(char *arg)
|
||||
ssize_t ret;
|
||||
unsigned long val;
|
||||
|
||||
if (!arg) {
|
||||
pr_err("memory_corruption_check_period config string not provided\n");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
ret = kstrtoul(arg, 10, &val);
|
||||
if (ret)
|
||||
return ret;
|
||||
@@ -59,6 +73,11 @@ static __init int set_corruption_check_size(char *arg)
|
||||
char *end;
|
||||
unsigned size;
|
||||
|
||||
if (!arg) {
|
||||
pr_err("memory_corruption_check_size config string not provided\n");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
size = memparse(arg, &end);
|
||||
|
||||
if (*end == '\0')
|
||||
@@ -113,7 +132,7 @@ void __init setup_bios_corruption_check(void)
|
||||
}
|
||||
|
||||
if (num_scan_areas)
|
||||
printk(KERN_INFO "Scanning %d areas for low memory corruption\n", num_scan_areas);
|
||||
pr_info("Scanning %d areas for low memory corruption\n", num_scan_areas);
|
||||
}
|
||||
|
||||
|
||||
@@ -132,8 +151,7 @@ void check_for_bios_corruption(void)
|
||||
for (; size; addr++, size -= sizeof(unsigned long)) {
|
||||
if (!*addr)
|
||||
continue;
|
||||
printk(KERN_ERR "Corrupted low memory at %p (%lx phys) = %08lx\n",
|
||||
addr, __pa(addr), *addr);
|
||||
pr_err("Corrupted low memory at %p (%lx phys) = %08lx\n", addr, __pa(addr), *addr);
|
||||
corruption = 1;
|
||||
*addr = 0;
|
||||
}
|
||||
@@ -157,11 +175,11 @@ static int start_periodic_check_for_corruption(void)
|
||||
if (!num_scan_areas || !memory_corruption_check || corruption_check_period == 0)
|
||||
return 0;
|
||||
|
||||
printk(KERN_INFO "Scanning for low memory corruption every %d seconds\n",
|
||||
corruption_check_period);
|
||||
pr_info("Scanning for low memory corruption every %d seconds\n", corruption_check_period);
|
||||
|
||||
/* First time we run the checks right away */
|
||||
schedule_delayed_work(&bios_check_work, 0);
|
||||
|
||||
return 0;
|
||||
}
|
||||
device_initcall(start_periodic_check_for_corruption);
|
||||
|
Reference in New Issue
Block a user