cregit-Linux how code gets into the kernel

Release 4.11 arch/x86/include/asm/edac.h

#ifndef _ASM_X86_EDAC_H

#define _ASM_X86_EDAC_H

/* ECC atomic, DMA, SMP and interrupt safe scrub function */


static inline void edac_atomic_scrub(void *va, u32 size) { u32 i, *virt_addr = va; /* * Very carefully read and write to memory atomically so we * are interrupt, DMA and SMP safe. */ for (i = 0; i < size / 4; i++, virt_addr++) asm volatile("lock; addl $0, %0"::"m" (*virt_addr)); }

Contributors

PersonTokensPropCommitsCommitProp
Thomas Gleixner3988.64%133.33%
Joe Perches49.09%133.33%
Borislav Petkov12.27%133.33%
Total44100.00%3100.00%

#endif /* _ASM_X86_EDAC_H */

Overall Contributors

PersonTokensPropCommitsCommitProp
Thomas Gleixner4685.19%240.00%
Joe Perches47.41%120.00%
H. Peter Anvin35.56%120.00%
Borislav Petkov11.85%120.00%
Total54100.00%5100.00%
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with cregit.