cregit-Linux how code gets into the kernel

Release 4.14 arch/x86/include/asm/edac.h

/* SPDX-License-Identifier: GPL-2.0 */
#ifndef _ASM_X86_EDAC_H

#define _ASM_X86_EDAC_H

/* ECC atomic, DMA, SMP and interrupt safe scrub function */


static inline void edac_atomic_scrub(void *va, u32 size) { u32 i, *virt_addr = va; /* * Very carefully read and write to memory atomically so we * are interrupt, DMA and SMP safe. */ for (i = 0; i < size / 4; i++, virt_addr++) asm volatile("lock; addl $0, %0"::"m" (*virt_addr)); }

Contributors

PersonTokensPropCommitsCommitProp
Thomas Gleixner3988.64%133.33%
Joe Perches49.09%133.33%
Borislav Petkov12.27%133.33%
Total44100.00%3100.00%

#endif /* _ASM_X86_EDAC_H */

Overall Contributors

PersonTokensPropCommitsCommitProp
Thomas Gleixner4683.64%233.33%
Joe Perches47.27%116.67%
H. Peter Anvin35.45%116.67%
Borislav Petkov11.82%116.67%
Greg Kroah-Hartman11.82%116.67%
Total55100.00%6100.00%
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with cregit.