+From ak@suse.de Mon May 23 09:16:11 2005
+Date: Tue, 17 May 2005 04:53:20 +0000
+From: Andi Kleen <ak@suse.de>
+To: stable@kernel.org
+Subject: [PATCH] x86_64: Add a guard page at the end of the 47bit address space
+
[PATCH] x86_64: Add a guard page at the end of the 47bit address space
This works around a bug in the AMD K8 CPUs.
+From ak@suse.de Mon May 23 09:16:11 2005
+Date: Tue, 17 May 2005 04:53:24 +0000
+From: Andi Kleen <ak@suse.de>
+To: stable@kernel.org
+Subject: [PATCH] x86_64: Don't look up struct page pointer of physical address in iounmap
+
[PATCH] x86_64: Don't look up struct page pointer of physical address in iounmap
It could be in a memory hole not mapped in mem_map and that causes the hash
+From ak@suse.de Mon May 23 09:16:11 2005
+Date: Tue, 17 May 2005 04:53:30 +0000
+From: Andi Kleen <ak@suse.de>
+To: stable@kernel.org
+Subject: [PATCH] x86_64: Fix canonical checking for segment registers in ptrace
+
[PATCH] x86_64: Fix canonical checking for segment registers in ptrace
Allowed user programs to set a non canonical segment base, which would cause
+From ak@suse.de Mon May 23 09:16:11 2005
+Date: Tue, 17 May 2005 04:53:29 +0000
+From: Andi Kleen <ak@suse.de>
+To: stable@kernel.org
+Subject: [PATCH] x86_64: check if ptrace RIP is canonical
+
[PATCH] x86_64: check if ptrace RIP is canonical
This works around an AMD Erratum.
+From ak@suse.de Mon May 23 09:16:11 2005
+Date: Tue, 17 May 2005 04:53:31 +0000
+From: Andi Kleen <ak@suse.de>
+To: stable@kernel.org
+Subject: [PATCH] x86_64: When checking vmalloc mappings don't use pte_page
+
[PATCH] x86_64: When checking vmalloc mappings don't use pte_page
The PTEs can point to ioremap mappings too, and these are often outside