1. 30 1月, 2008 1 次提交
  2. 20 10月, 2007 1 次提交
  3. 18 10月, 2007 1 次提交
  4. 11 10月, 2007 1 次提交
  5. 12 8月, 2007 1 次提交
  6. 23 7月, 2007 1 次提交
  7. 22 7月, 2007 1 次提交
  8. 22 5月, 2007 1 次提交
  9. 03 5月, 2007 2 次提交
  10. 02 4月, 2007 1 次提交
    • A
      [PATCH] x86-64: Disable local APIC timer use on AMD systems with C1E · 3556ddfa
      Andi Kleen 提交于
      AMD dual core laptops with C1E do not run the APIC timer correctly
      when they go idle. Previously the code assumed this only happened
      on C2 or deeper.  But not all of these systems report support C2.
      
      Use a AMD supplied snippet to detect C1E being enabled and then disable
      local apic timer use.
      
      This supercedes an earlier workaround using DMI detection of specific systems.
      
      Thanks to Mark Langsdorf for the detection snippet.
      Signed-off-by: NAndi Kleen <ak@suse.de>
      3556ddfa
  11. 07 12月, 2006 1 次提交
  12. 26 9月, 2006 4 次提交
  13. 28 6月, 2006 1 次提交
  14. 27 6月, 2006 2 次提交
  15. 20 4月, 2006 1 次提交
    • A
      [PATCH] i386/x86-64: Fix x87 information leak between processes · 18bd057b
      Andi Kleen 提交于
      AMD K7/K8 CPUs only save/restore the FOP/FIP/FDP x87 registers in FXSAVE
      when an exception is pending.  This means the value leak through
      context switches and allow processes to observe some x87 instruction
      state of other processes.
      
      This was actually documented by AMD, but nobody recognized it as
      being different from Intel before.
      
      The fix first adds an optimization: instead of unconditionally
      calling FNCLEX after each FXSAVE test if ES is pending and skip
      it when not needed. Then do a x87 load from a kernel variable to
      clear FOP/FIP/FDP.
      
      This means other processes always will only see a constant value
      defined by the kernel in their FP state.
      
      I took some pain to make sure to chose a variable that's already
      in L1 during context switch to make the overhead of this low.
      
      Also alternative() is used to patch away the new code on CPUs
      who don't need it.
      
      Patch for both i386/x86-64.
      
      The problem was discovered originally by Jan Beulich. Richard
      Brunner provided the basic code for the workarounds, with contribution
      from Jan.
      
      This is CVE-2006-1056
      
      Cc: richard.brunner@amd.com
      Cc: jbeulich@novell.com
      Signed-off-by: NAndi Kleen <ak@suse.de>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      18bd057b
  16. 11 4月, 2006 1 次提交
  17. 06 2月, 2006 1 次提交
  18. 12 1月, 2006 2 次提交
  19. 07 1月, 2006 1 次提交
  20. 15 11月, 2005 1 次提交
  21. 11 10月, 2005 1 次提交
  22. 30 9月, 2005 1 次提交
  23. 21 5月, 2005 1 次提交
  24. 17 5月, 2005 1 次提交
  25. 22 4月, 2005 1 次提交
  26. 17 4月, 2005 3 次提交