Revision e75417739b1de4f6eb99f3f080c67bfd6812d562 authored by Greg Kroah-Hartman on 29 September 2018, 21:34:06 UTC, committed by Greg Kroah-Hartman on 29 September 2018, 21:34:06 UTC
Thomas writes: "A single fix for the AMD memory encryption boot code so it does not read random garbage instead of the cached encryption bit when a kexec kernel is allocated above the 32bit address limit." * 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/boot: Fix kexec booting failure in the SEV bit detection code
File | Mode | Size |
---|---|---|
hisilicon | ||
Kconfig | -rw-r--r-- | 2.9 KB |
Makefile | -rw-r--r-- | 456 bytes |
arm-cci.c | -rw-r--r-- | 48.2 KB |
arm-ccn.c | -rw-r--r-- | 46.3 KB |
arm_dsu_pmu.c | -rw-r--r-- | 21.7 KB |
arm_pmu.c | -rw-r--r-- | 20.9 KB |
arm_pmu_acpi.c | -rw-r--r-- | 6.7 KB |
arm_pmu_platform.c | -rw-r--r-- | 5.5 KB |
arm_spe_pmu.c | -rw-r--r-- | 33.7 KB |
qcom_l2_pmu.c | -rw-r--r-- | 28.0 KB |
qcom_l3_pmu.c | -rw-r--r-- | 24.5 KB |
xgene_pmu.c | -rw-r--r-- | 55.6 KB |
![swh spinner](/static/img/swh-spinner.gif)
Computing file changes ...