From: Chris Wright Date: Mon, 23 May 2005 18:30:14 +0000 (-0700) Subject: Update x86_64 patches with proper headers X-Git-Tag: v2.6.11.11~5 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=d8d46fcae05c570a14f3011fca161e6af44f7363;p=thirdparty%2Fkernel%2Fstable-queue.git Update x86_64 patches with proper headers --- diff --git a/queue/x86_64-add-guard-page.patch b/queue/x86_64-add-guard-page.patch index dcc418d63b5..7716f36c5d3 100644 --- a/queue/x86_64-add-guard-page.patch +++ b/queue/x86_64-add-guard-page.patch @@ -1,3 +1,9 @@ +From ak@suse.de Mon May 23 09:16:11 2005 +Date: Tue, 17 May 2005 04:53:20 +0000 +From: Andi Kleen +To: stable@kernel.org +Subject: [PATCH] x86_64: Add a guard page at the end of the 47bit address space + [PATCH] x86_64: Add a guard page at the end of the 47bit address space This works around a bug in the AMD K8 CPUs. diff --git a/queue/x86_64-dont-lookup-page-of-pa-in-iounmap.patch b/queue/x86_64-dont-lookup-page-of-pa-in-iounmap.patch index 2bff40cab5a..c668f480f6b 100644 --- a/queue/x86_64-dont-lookup-page-of-pa-in-iounmap.patch +++ b/queue/x86_64-dont-lookup-page-of-pa-in-iounmap.patch @@ -1,3 +1,9 @@ +From ak@suse.de Mon May 23 09:16:11 2005 +Date: Tue, 17 May 2005 04:53:24 +0000 +From: Andi Kleen +To: stable@kernel.org +Subject: [PATCH] x86_64: Don't look up struct page pointer of physical address in iounmap + [PATCH] x86_64: Don't look up struct page pointer of physical address in iounmap It could be in a memory hole not mapped in mem_map and that causes the hash diff --git a/queue/x86_64-fix-canonical-checking.patch b/queue/x86_64-fix-canonical-checking.patch index c1e9a0bb277..77b06813265 100644 --- a/queue/x86_64-fix-canonical-checking.patch +++ b/queue/x86_64-fix-canonical-checking.patch @@ -1,3 +1,9 @@ +From ak@suse.de Mon May 23 09:16:11 2005 +Date: Tue, 17 May 2005 04:53:30 +0000 +From: Andi Kleen +To: stable@kernel.org +Subject: [PATCH] x86_64: Fix canonical checking for segment registers in ptrace + [PATCH] x86_64: Fix canonical checking for segment registers in ptrace Allowed user programs to set a non canonical segment base, which would cause diff --git a/queue/x86_64-ptrace-RIP-is-canonical.patch b/queue/x86_64-ptrace-RIP-is-canonical.patch index 437df29d149..12d0a14021d 100644 --- a/queue/x86_64-ptrace-RIP-is-canonical.patch +++ b/queue/x86_64-ptrace-RIP-is-canonical.patch @@ -1,3 +1,9 @@ +From ak@suse.de Mon May 23 09:16:11 2005 +Date: Tue, 17 May 2005 04:53:29 +0000 +From: Andi Kleen +To: stable@kernel.org +Subject: [PATCH] x86_64: check if ptrace RIP is canonical + [PATCH] x86_64: check if ptrace RIP is canonical This works around an AMD Erratum. diff --git a/queue/x86_64-vmalloc-mapping-dont-use-pte_page.patch b/queue/x86_64-vmalloc-mapping-dont-use-pte_page.patch index a4129c75a74..e54b48b0462 100644 --- a/queue/x86_64-vmalloc-mapping-dont-use-pte_page.patch +++ b/queue/x86_64-vmalloc-mapping-dont-use-pte_page.patch @@ -1,3 +1,9 @@ +From ak@suse.de Mon May 23 09:16:11 2005 +Date: Tue, 17 May 2005 04:53:31 +0000 +From: Andi Kleen +To: stable@kernel.org +Subject: [PATCH] x86_64: When checking vmalloc mappings don't use pte_page + [PATCH] x86_64: When checking vmalloc mappings don't use pte_page The PTEs can point to ioremap mappings too, and these are often outside