From d8d46fcae05c570a14f3011fca161e6af44f7363 Mon Sep 17 00:00:00 2001 From: Chris Wright Date: Mon, 23 May 2005 11:30:14 -0700 Subject: [PATCH] Update x86_64 patches with proper headers --- queue/x86_64-add-guard-page.patch | 6 ++++++ queue/x86_64-dont-lookup-page-of-pa-in-iounmap.patch | 6 ++++++ queue/x86_64-fix-canonical-checking.patch | 6 ++++++ queue/x86_64-ptrace-RIP-is-canonical.patch | 6 ++++++ queue/x86_64-vmalloc-mapping-dont-use-pte_page.patch | 6 ++++++ 5 files changed, 30 insertions(+) diff --git a/queue/x86_64-add-guard-page.patch b/queue/x86_64-add-guard-page.patch index dcc418d63b5..7716f36c5d3 100644 --- a/queue/x86_64-add-guard-page.patch +++ b/queue/x86_64-add-guard-page.patch @@ -1,3 +1,9 @@ +From ak@suse.de Mon May 23 09:16:11 2005 +Date: Tue, 17 May 2005 04:53:20 +0000 +From: Andi Kleen +To: stable@kernel.org +Subject: [PATCH] x86_64: Add a guard page at the end of the 47bit address space + [PATCH] x86_64: Add a guard page at the end of the 47bit address space This works around a bug in the AMD K8 CPUs. diff --git a/queue/x86_64-dont-lookup-page-of-pa-in-iounmap.patch b/queue/x86_64-dont-lookup-page-of-pa-in-iounmap.patch index 2bff40cab5a..c668f480f6b 100644 --- a/queue/x86_64-dont-lookup-page-of-pa-in-iounmap.patch +++ b/queue/x86_64-dont-lookup-page-of-pa-in-iounmap.patch @@ -1,3 +1,9 @@ +From ak@suse.de Mon May 23 09:16:11 2005 +Date: Tue, 17 May 2005 04:53:24 +0000 +From: Andi Kleen +To: stable@kernel.org +Subject: [PATCH] x86_64: Don't look up struct page pointer of physical address in iounmap + [PATCH] x86_64: Don't look up struct page pointer of physical address in iounmap It could be in a memory hole not mapped in mem_map and that causes the hash diff --git a/queue/x86_64-fix-canonical-checking.patch b/queue/x86_64-fix-canonical-checking.patch index c1e9a0bb277..77b06813265 100644 --- a/queue/x86_64-fix-canonical-checking.patch +++ b/queue/x86_64-fix-canonical-checking.patch @@ -1,3 +1,9 @@ +From ak@suse.de Mon May 23 09:16:11 2005 +Date: Tue, 17 May 2005 04:53:30 +0000 +From: Andi Kleen +To: stable@kernel.org +Subject: [PATCH] x86_64: Fix canonical checking for segment registers in ptrace + [PATCH] x86_64: Fix canonical checking for segment registers in ptrace Allowed user programs to set a non canonical segment base, which would cause diff --git a/queue/x86_64-ptrace-RIP-is-canonical.patch b/queue/x86_64-ptrace-RIP-is-canonical.patch index 437df29d149..12d0a14021d 100644 --- a/queue/x86_64-ptrace-RIP-is-canonical.patch +++ b/queue/x86_64-ptrace-RIP-is-canonical.patch @@ -1,3 +1,9 @@ +From ak@suse.de Mon May 23 09:16:11 2005 +Date: Tue, 17 May 2005 04:53:29 +0000 +From: Andi Kleen +To: stable@kernel.org +Subject: [PATCH] x86_64: check if ptrace RIP is canonical + [PATCH] x86_64: check if ptrace RIP is canonical This works around an AMD Erratum. diff --git a/queue/x86_64-vmalloc-mapping-dont-use-pte_page.patch b/queue/x86_64-vmalloc-mapping-dont-use-pte_page.patch index a4129c75a74..e54b48b0462 100644 --- a/queue/x86_64-vmalloc-mapping-dont-use-pte_page.patch +++ b/queue/x86_64-vmalloc-mapping-dont-use-pte_page.patch @@ -1,3 +1,9 @@ +From ak@suse.de Mon May 23 09:16:11 2005 +Date: Tue, 17 May 2005 04:53:31 +0000 +From: Andi Kleen +To: stable@kernel.org +Subject: [PATCH] x86_64: When checking vmalloc mappings don't use pte_page + [PATCH] x86_64: When checking vmalloc mappings don't use pte_page The PTEs can point to ioremap mappings too, and these are often outside -- 2.47.3