1. 27 12月, 2019 4 次提交
  2. 02 9月, 2018 2 次提交
  3. 10 8月, 2018 1 次提交
  4. 22 6月, 2018 1 次提交
  5. 28 5月, 2018 1 次提交
  6. 24 4月, 2018 2 次提交
  7. 27 3月, 2018 1 次提交
  8. 17 3月, 2018 2 次提交
  9. 08 3月, 2018 7 次提交
  10. 17 2月, 2018 2 次提交
  11. 15 2月, 2018 2 次提交
  12. 24 1月, 2018 2 次提交
  13. 09 1月, 2018 1 次提交
  14. 06 1月, 2018 1 次提交
  15. 23 12月, 2017 1 次提交
    • P
      x86/microcode: Dont abuse the TLB-flush interface · 23cb7d46
      Peter Zijlstra 提交于
      Commit:
      
        ec400dde ("x86/microcode_intel_early.c: Early update ucode on Intel's CPU")
      
      ... grubbed into tlbflush internals without coherent explanation.
      
      Since it says its a precaution and the SDM doesn't mention anything like
      this, take it out back.
      Signed-off-by: NPeter Zijlstra (Intel) <peterz@infradead.org>
      Signed-off-by: NThomas Gleixner <tglx@linutronix.de>
      Cc: Andy Lutomirski <luto@kernel.org>
      Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com>
      Cc: Borislav Petkov <bp@alien8.de>
      Cc: Brian Gerst <brgerst@gmail.com>
      Cc: Dave Hansen <dave.hansen@linux.intel.com>
      Cc: David Laight <David.Laight@aculab.com>
      Cc: Denys Vlasenko <dvlasenk@redhat.com>
      Cc: Eduardo Valentin <eduval@amazon.com>
      Cc: Greg KH <gregkh@linuxfoundation.org>
      Cc: H. Peter Anvin <hpa@zytor.com>
      Cc: Josh Poimboeuf <jpoimboe@redhat.com>
      Cc: Juergen Gross <jgross@suse.com>
      Cc: Linus Torvalds <torvalds@linux-foundation.org>
      Cc: Peter Zijlstra <peterz@infradead.org>
      Cc: Will Deacon <will.deacon@arm.com>
      Cc: aliguori@amazon.com
      Cc: daniel.gruss@iaik.tugraz.at
      Cc: fenghua.yu@intel.com
      Cc: hughd@google.com
      Cc: keescook@google.com
      Cc: linux-mm@kvack.org
      Signed-off-by: NIngo Molnar <mingo@kernel.org>
      23cb7d46
  16. 06 12月, 2017 1 次提交
  17. 18 10月, 2017 1 次提交
  18. 14 10月, 2017 1 次提交
  19. 29 8月, 2017 1 次提交
  20. 18 8月, 2017 1 次提交
  21. 25 7月, 2017 1 次提交
    • S
      x86/microcode/AMD: Free unneeded patch before exit from update_cache() · a99f0342
      Shu Wang 提交于
      verify_and_add_patch() allocates memory for a microcode patch and hands
      it down to be added to the cache of patches. However, if the cache
      already has the latest patch, the newly allocated one needs to be freed
      before returning. Do that.
      
      This issue has been found by kmemleak:
      
        unreferenced object 0xffff88010e780b40 (size 32):
          comm "bash", pid 860, jiffies 4294690939 (age 29.297s)
          backtrace:
             kmemleak_alloc
             kmem_cache_alloc_trace
             load_microcode_amd.isra.0
             request_microcode_amd
             reload_store
             dev_attr_store
             sysfs_kf_write
             kernfs_fop_write
             __vfs_write
             vfs_write
             SyS_write
             do_syscall_64
             return_from_SYSCALL_64
             0xffffffffffffffff
      
        (gdb) list *0xffffffff81050d60
        0xffffffff81050d60 is in load_microcode_amd
                      (arch/x86/kernel/cpu/microcode/amd.c:616).
      
      which is this:
      
      	patch = kzalloc(sizeof(*patch), GFP_KERNEL);
      -->	if (!patch) {
      		pr_err("Patch allocation failure.\n");
      		return -EINVAL;
      	}
      Signed-off-by: NShu Wang <shuwang@redhat.com>
      [ Rewrite commit message. ]
      Signed-off-by: NBorislav Petkov <bp@suse.de>
      Cc: Linus Torvalds <torvalds@linux-foundation.org>
      Cc: Peter Zijlstra <peterz@infradead.org>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: chuhu@redhat.com
      Cc: liwang@redhat.com
      Link: http://lkml.kernel.org/r/20170724101228.17326-2-bp@alien8.deSigned-off-by: NIngo Molnar <mingo@kernel.org>
      a99f0342
  22. 26 6月, 2017 1 次提交
  23. 20 6月, 2017 2 次提交
  24. 08 6月, 2017 1 次提交