From a572605d405804648d3fec2b49a91bf891ec5b92 Mon Sep 17 00:00:00 2001 From: Thomas Lamprecht Date: Tue, 3 Dec 2024 11:23:15 +0100 Subject: [PATCH] rebase patches on top of Ubuntu-6.8.0-51.52 (generated with debian/scripts/import-upstream-tag) Signed-off-by: Thomas Lamprecht --- ...ides-for-missing-ACS-capabilities-4..patch | 4 +- ...sk-out-PKRU-bit-in-xfeatures-if-vCPU.patch | 2 +- ...allow-pass-through-on-broken-hardwar.patch | 2 +- ...-Advertise-support-for-flush-by-ASID.patch | 4 +- ...ix-pagecache-leak-when-do-writepages.patch | 2 +- ...pu-pm-Don-t-use-OD-table-on-Arcturus.patch | 2 +- ...CE-iommu-intel-disable-DMAR-for-SKL.patch} | 2 +- ...ix-possible-NULL-pointer-dereference.patch | 101 ------------------ ...n-Power-Indicator-bits-for-userspace.patch | 54 ---------- ...-EOPNOTSUPP-for-IOCB_NOWAIT-like-EA.patch} | 0 ...t-subreq-iov-iter-before-tail-clean.patch} | 4 +- ...-virtualized-VMLOAD-VMSAVE-on-Zen4-.patch} | 2 +- 12 files changed, 12 insertions(+), 167 deletions(-) rename patches/kernel/{0017-Revert-UBUNTU-SAUCE-iommu-intel-disable-DMAR-for-SKL.patch => 0015-Revert-UBUNTU-SAUCE-iommu-intel-disable-DMAR-for-SKL.patch} (98%) delete mode 100644 patches/kernel/0015-apparmor-fix-possible-NULL-pointer-dereference.patch delete mode 100644 patches/kernel/0016-PCI-pciehp-Retain-Power-Indicator-bits-for-userspace.patch rename patches/kernel/{0018-io_uring-rw-treat-EOPNOTSUPP-for-IOCB_NOWAIT-like-EA.patch => 0016-io_uring-rw-treat-EOPNOTSUPP-for-IOCB_NOWAIT-like-EA.patch} (100%) rename patches/kernel/{0019-netfs-reset-subreq-iov-iter-before-tail-clean.patch => 0017-netfs-reset-subreq-iov-iter-before-tail-clean.patch} (89%) rename patches/kernel/{0020-x86-CPU-AMD-Clear-virtualized-VMLOAD-VMSAVE-on-Zen4-.patch => 0018-x86-CPU-AMD-Clear-virtualized-VMLOAD-VMSAVE-on-Zen4-.patch} (97%) diff --git a/patches/kernel/0004-pci-Enable-overrides-for-missing-ACS-capabilities-4..patch b/patches/kernel/0004-pci-Enable-overrides-for-missing-ACS-capabilities-4..patch index 0ff2916..02c6d64 100644 --- a/patches/kernel/0004-pci-Enable-overrides-for-missing-ACS-capabilities-4..patch +++ b/patches/kernel/0004-pci-Enable-overrides-for-missing-ACS-capabilities-4..patch @@ -55,10 +55,10 @@ Signed-off-by: Thomas Lamprecht 2 files changed, 111 insertions(+) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt -index e58f3bbb7643..d574123d82bd 100644 +index e9be08602d4d..2ed9b047bbd8 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt -@@ -4403,6 +4403,15 @@ +@@ -4397,6 +4397,15 @@ Also, it enforces the PCI Local Bus spec rule that those bits should be 0 in system reset events (useful for kexec/kdump cases). diff --git a/patches/kernel/0008-kvm-xsave-set-mask-out-PKRU-bit-in-xfeatures-if-vCPU.patch b/patches/kernel/0008-kvm-xsave-set-mask-out-PKRU-bit-in-xfeatures-if-vCPU.patch index 233c666..3ef9c52 100644 --- a/patches/kernel/0008-kvm-xsave-set-mask-out-PKRU-bit-in-xfeatures-if-vCPU.patch +++ b/patches/kernel/0008-kvm-xsave-set-mask-out-PKRU-bit-in-xfeatures-if-vCPU.patch @@ -108,7 +108,7 @@ index 23dbb9eb277c..07da153802e4 100644 int cpuid_query_maxphyaddr(struct kvm_vcpu *vcpu); diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c -index 3750a0c688b7..706348cbde7c 100644 +index e36bf6162fc8..08ef6f01bf7e 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -5580,6 +5580,19 @@ static int kvm_vcpu_ioctl_x86_set_xsave(struct kvm_vcpu *vcpu, diff --git a/patches/kernel/0009-allow-opt-in-to-allow-pass-through-on-broken-hardwar.patch b/patches/kernel/0009-allow-opt-in-to-allow-pass-through-on-broken-hardwar.patch index a29f003..c75297a 100644 --- a/patches/kernel/0009-allow-opt-in-to-allow-pass-through-on-broken-hardwar.patch +++ b/patches/kernel/0009-allow-opt-in-to-allow-pass-through-on-broken-hardwar.patch @@ -11,7 +11,7 @@ Signed-off-by: Thomas Lamprecht 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c -index 31ff09cc5737..9e8cdd7298d3 100644 +index 94518306c6f9..d9cc1264e40a 100644 --- a/drivers/iommu/intel/iommu.c +++ b/drivers/iommu/intel/iommu.c @@ -234,6 +234,7 @@ static int dmar_map_gfx = 1; diff --git a/patches/kernel/0010-KVM-nSVM-Advertise-support-for-flush-by-ASID.patch b/patches/kernel/0010-KVM-nSVM-Advertise-support-for-flush-by-ASID.patch index f248acc..c4b0186 100644 --- a/patches/kernel/0010-KVM-nSVM-Advertise-support-for-flush-by-ASID.patch +++ b/patches/kernel/0010-KVM-nSVM-Advertise-support-for-flush-by-ASID.patch @@ -24,10 +24,10 @@ Signed-off-by: Thomas Lamprecht 1 file changed, 1 insertion(+) diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c -index cf86607bc696..e2c080780d9a 100644 +index 9d070f7da796..2ac30170f887 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c -@@ -5102,6 +5102,7 @@ static __init void svm_set_cpu_caps(void) +@@ -5114,6 +5114,7 @@ static __init void svm_set_cpu_caps(void) if (nested) { kvm_cpu_cap_set(X86_FEATURE_SVM); kvm_cpu_cap_set(X86_FEATURE_VMCBCLEAN); diff --git a/patches/kernel/0013-cifs-fix-pagecache-leak-when-do-writepages.patch b/patches/kernel/0013-cifs-fix-pagecache-leak-when-do-writepages.patch index e7f0832..79ae5aa 100644 --- a/patches/kernel/0013-cifs-fix-pagecache-leak-when-do-writepages.patch +++ b/patches/kernel/0013-cifs-fix-pagecache-leak-when-do-writepages.patch @@ -47,7 +47,7 @@ Signed-off-by: Fiona Ebner 1 file changed, 13 insertions(+), 3 deletions(-) diff --git a/fs/smb/client/file.c b/fs/smb/client/file.c -index 438d68d681b1..dc5165b16956 100644 +index d495e3511014..e755ae643c09 100644 --- a/fs/smb/client/file.c +++ b/fs/smb/client/file.c @@ -2845,17 +2845,21 @@ static ssize_t cifs_write_back_from_locked_folio(struct address_space *mapping, diff --git a/patches/kernel/0014-drm-amdgpu-pm-Don-t-use-OD-table-on-Arcturus.patch b/patches/kernel/0014-drm-amdgpu-pm-Don-t-use-OD-table-on-Arcturus.patch index cd88e43..086a9cb 100644 --- a/patches/kernel/0014-drm-amdgpu-pm-Don-t-use-OD-table-on-Arcturus.patch +++ b/patches/kernel/0014-drm-amdgpu-pm-Don-t-use-OD-table-on-Arcturus.patch @@ -16,7 +16,7 @@ Signed-off-by: Fiona Ebner 1 file changed, 5 insertions(+), 28 deletions(-) diff --git a/drivers/gpu/drm/amd/pm/swsmu/smu11/arcturus_ppt.c b/drivers/gpu/drm/amd/pm/swsmu/smu11/arcturus_ppt.c -index 40ba7227cca5..0c2d04f978ac 100644 +index 437ac31b1673..415032f58522 100644 --- a/drivers/gpu/drm/amd/pm/swsmu/smu11/arcturus_ppt.c +++ b/drivers/gpu/drm/amd/pm/swsmu/smu11/arcturus_ppt.c @@ -1283,11 +1283,8 @@ static int arcturus_get_power_limit(struct smu_context *smu, diff --git a/patches/kernel/0017-Revert-UBUNTU-SAUCE-iommu-intel-disable-DMAR-for-SKL.patch b/patches/kernel/0015-Revert-UBUNTU-SAUCE-iommu-intel-disable-DMAR-for-SKL.patch similarity index 98% rename from patches/kernel/0017-Revert-UBUNTU-SAUCE-iommu-intel-disable-DMAR-for-SKL.patch rename to patches/kernel/0015-Revert-UBUNTU-SAUCE-iommu-intel-disable-DMAR-for-SKL.patch index 08510be..b273b4a 100644 --- a/patches/kernel/0017-Revert-UBUNTU-SAUCE-iommu-intel-disable-DMAR-for-SKL.patch +++ b/patches/kernel/0015-Revert-UBUNTU-SAUCE-iommu-intel-disable-DMAR-for-SKL.patch @@ -14,7 +14,7 @@ This reverts commit b310f5f58c83756fc164f7d391d76f0df9cc65c3. 1 file changed, 27 deletions(-) diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c -index 9e8cdd7298d3..5e037a9ea6a6 100644 +index d9cc1264e40a..89fdcaad20e1 100644 --- a/drivers/iommu/intel/iommu.c +++ b/drivers/iommu/intel/iommu.c @@ -5034,33 +5034,6 @@ DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x1632, quirk_iommu_igfx); diff --git a/patches/kernel/0015-apparmor-fix-possible-NULL-pointer-dereference.patch b/patches/kernel/0015-apparmor-fix-possible-NULL-pointer-dereference.patch deleted file mode 100644 index 36d4297..0000000 --- a/patches/kernel/0015-apparmor-fix-possible-NULL-pointer-dereference.patch +++ /dev/null @@ -1,101 +0,0 @@ -From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 -From: Leesoo Ahn -Date: Wed, 8 May 2024 01:12:29 +0900 -Subject: [PATCH] apparmor: fix possible NULL pointer dereference - -profile->parent->dents[AAFS_PROF_DIR] could be NULL only if its parent is made -from __create_missing_ancestors(..) and 'ent->old' is NULL in -aa_replace_profiles(..). -In that case, it must return an error code and the code, -ENOENT represents -its state that the path of its parent is not existed yet. - -BUG: kernel NULL pointer dereference, address: 0000000000000030 -PGD 0 P4D 0 -PREEMPT SMP PTI -CPU: 4 PID: 3362 Comm: apparmor_parser Not tainted 6.8.0-24-generic #24 -Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014 -RIP: 0010:aafs_create.constprop.0+0x7f/0x130 -Code: 4c 63 e0 48 83 c4 18 4c 89 e0 5b 41 5c 41 5d 41 5e 41 5f 5d 31 d2 31 c9 31 f6 31 ff 45 31 c0 45 31 c9 45 31 d2 c3 cc cc cc cc <4d> 8b 55 30 4d 8d ba a0 00 00 00 4c 89 55 c0 4c 89 ff e8 7a 6a ae -RSP: 0018:ffffc9000b2c7c98 EFLAGS: 00010246 -RAX: 0000000000000000 RBX: 00000000000041ed RCX: 0000000000000000 -RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 -RBP: ffffc9000b2c7cd8 R08: 0000000000000000 R09: 0000000000000000 -R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff82baac10 -R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 -FS: 00007be9f22cf740(0000) GS:ffff88817bc00000(0000) knlGS:0000000000000000 -CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 -CR2: 0000000000000030 CR3: 0000000134b08000 CR4: 00000000000006f0 -Call Trace: - - ? show_regs+0x6d/0x80 - ? __die+0x24/0x80 - ? page_fault_oops+0x99/0x1b0 - ? kernelmode_fixup_or_oops+0xb2/0x140 - ? __bad_area_nosemaphore+0x1a5/0x2c0 - ? find_vma+0x34/0x60 - ? bad_area_nosemaphore+0x16/0x30 - ? do_user_addr_fault+0x2a2/0x6b0 - ? exc_page_fault+0x83/0x1b0 - ? asm_exc_page_fault+0x27/0x30 - ? aafs_create.constprop.0+0x7f/0x130 - ? aafs_create.constprop.0+0x51/0x130 - __aafs_profile_mkdir+0x3d6/0x480 - aa_replace_profiles+0x83f/0x1270 - policy_update+0xe3/0x180 - profile_load+0xbc/0x150 - ? rw_verify_area+0x47/0x140 - vfs_write+0x100/0x480 - ? __x64_sys_openat+0x55/0xa0 - ? syscall_exit_to_user_mode+0x86/0x260 - ksys_write+0x73/0x100 - __x64_sys_write+0x19/0x30 - x64_sys_call+0x7e/0x25c0 - do_syscall_64+0x7f/0x180 - entry_SYSCALL_64_after_hwframe+0x78/0x80 -RIP: 0033:0x7be9f211c574 -Code: c7 00 16 00 00 00 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 80 3d d5 ea 0e 00 00 74 13 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 55 48 89 e5 48 83 ec 20 48 89 -RSP: 002b:00007ffd26f2b8c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 -RAX: ffffffffffffffda RBX: 00005d504415e200 RCX: 00007be9f211c574 -RDX: 0000000000001fc1 RSI: 00005d504418bc80 RDI: 0000000000000004 -RBP: 0000000000001fc1 R08: 0000000000001fc1 R09: 0000000080000000 -R10: 0000000000000000 R11: 0000000000000202 R12: 00005d504418bc80 -R13: 0000000000000004 R14: 00007ffd26f2b9b0 R15: 00007ffd26f2ba30 - -Modules linked in: snd_seq_dummy snd_hrtimer qrtr snd_hda_codec_generic snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device i2c_i801 snd_timer i2c_smbus qxl snd soundcore drm_ttm_helper lpc_ich ttm joydev input_leds serio_raw mac_hid binfmt_misc msr parport_pc ppdev lp parport efi_pstore nfnetlink dmi_sysfs qemu_fw_cfg ip_tables x_tables autofs4 hid_generic usbhid hid ahci libahci psmouse virtio_rng xhci_pci xhci_pci_renesas -CR2: 0000000000000030 ----[ end trace 0000000000000000 ]--- -RIP: 0010:aafs_create.constprop.0+0x7f/0x130 -Code: 4c 63 e0 48 83 c4 18 4c 89 e0 5b 41 5c 41 5d 41 5e 41 5f 5d 31 d2 31 c9 31 f6 31 ff 45 31 c0 45 31 c9 45 31 d2 c3 cc cc cc cc <4d> 8b 55 30 4d 8d ba a0 00 00 00 4c 89 55 c0 4c 89 ff e8 7a 6a ae -RSP: 0018:ffffc9000b2c7c98 EFLAGS: 00010246 -RAX: 0000000000000000 RBX: 00000000000041ed RCX: 0000000000000000 -RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 -RBP: ffffc9000b2c7cd8 R08: 0000000000000000 R09: 0000000000000000 -R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff82baac10 -R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 -FS: 00007be9f22cf740(0000) GS:ffff88817bc00000(0000) knlGS:0000000000000000 -CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 -CR2: 0000000000000030 CR3: 0000000134b08000 CR4: 00000000000006f0 - -Signed-off-by: Leesoo Ahn -Signed-off-by: John Johansen -(cherry picked from commit 3dd384108d53834002be5630132ad5c3f32166ad) -Signed-off-by: Fiona Ebner ---- - security/apparmor/apparmorfs.c | 4 ++++ - 1 file changed, 4 insertions(+) - -diff --git a/security/apparmor/apparmorfs.c b/security/apparmor/apparmorfs.c -index be6c3293c9e0..822f2e6a96a7 100644 ---- a/security/apparmor/apparmorfs.c -+++ b/security/apparmor/apparmorfs.c -@@ -1921,6 +1921,10 @@ int __aafs_profile_mkdir(struct aa_profile *profile, struct dentry *parent) - struct aa_profile *p; - p = aa_deref_parent(profile); - dent = prof_dir(p); -+ if (!dent) { -+ error = -ENOENT; -+ goto fail2; -+ } - /* adding to parent that previously didn't have children */ - dent = aafs_create_dir("profiles", dent); - if (IS_ERR(dent)) diff --git a/patches/kernel/0016-PCI-pciehp-Retain-Power-Indicator-bits-for-userspace.patch b/patches/kernel/0016-PCI-pciehp-Retain-Power-Indicator-bits-for-userspace.patch deleted file mode 100644 index 7f29e5c..0000000 --- a/patches/kernel/0016-PCI-pciehp-Retain-Power-Indicator-bits-for-userspace.patch +++ /dev/null @@ -1,54 +0,0 @@ -From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 -From: Blazej Kucman -Date: Mon, 22 Jul 2024 16:14:40 +0200 -Subject: [PATCH] PCI: pciehp: Retain Power Indicator bits for userspace - indicators - -The sysfs "attention" file normally controls the Slot Control Attention -Indicator with 0 (off), 1 (on), 2 (blink) settings. - -576243b3f9ea ("PCI: pciehp: Allow exclusive userspace control of -indicators") added pciehp_set_raw_indicator_status() to allow userspace to -directly control all four bits in both the Attention Indicator and the -Power Indicator fields via the "attention" file. - -This is used on Intel VMD bridges so utilities like "ledmon" can use sysfs -"attention" to control up to 16 indicators for NVMe device RAID status. - -abaaac4845a0 ("PCI: hotplug: Use FIELD_GET/PREP()") broke this by masking -the sysfs data with PCI_EXP_SLTCTL_AIC, which discards the upper two bits -intended for the Power Indicator Control field (PCI_EXP_SLTCTL_PIC). - -For NVMe devices behind an Intel VMD, ledmon settings that use the -PCI_EXP_SLTCTL_PIC bits, i.e., ATTENTION_REBUILD (0x5), ATTENTION_LOCATE -(0x7), ATTENTION_FAILURE (0xD), ATTENTION_OFF (0xF), no longer worked -correctly. - -Mask with PCI_EXP_SLTCTL_AIC | PCI_EXP_SLTCTL_PIC to retain both the -Attention Indicator and the Power Indicator bits. - -Fixes: abaaac4845a0 ("PCI: hotplug: Use FIELD_GET/PREP()") -Link: https://lore.kernel.org/r/20240722141440.7210-1-blazej.kucman@intel.com -Signed-off-by: Blazej Kucman -[bhelgaas: commit log] -Signed-off-by: Bjorn Helgaas -Cc: stable@vger.kernel.org # v6.7+ ---- - drivers/pci/hotplug/pciehp_hpc.c | 4 +++- - 1 file changed, 3 insertions(+), 1 deletion(-) - -diff --git a/drivers/pci/hotplug/pciehp_hpc.c b/drivers/pci/hotplug/pciehp_hpc.c -index b1d0a1b3917d..9d3c249207c4 100644 ---- a/drivers/pci/hotplug/pciehp_hpc.c -+++ b/drivers/pci/hotplug/pciehp_hpc.c -@@ -485,7 +485,9 @@ int pciehp_set_raw_indicator_status(struct hotplug_slot *hotplug_slot, - struct pci_dev *pdev = ctrl_dev(ctrl); - - pci_config_pm_runtime_get(pdev); -- pcie_write_cmd_nowait(ctrl, FIELD_PREP(PCI_EXP_SLTCTL_AIC, status), -+ -+ /* Attention and Power Indicator Control bits are supported */ -+ pcie_write_cmd_nowait(ctrl, FIELD_PREP(PCI_EXP_SLTCTL_AIC | PCI_EXP_SLTCTL_PIC, status), - PCI_EXP_SLTCTL_AIC | PCI_EXP_SLTCTL_PIC); - pci_config_pm_runtime_put(pdev); - return 0; diff --git a/patches/kernel/0018-io_uring-rw-treat-EOPNOTSUPP-for-IOCB_NOWAIT-like-EA.patch b/patches/kernel/0016-io_uring-rw-treat-EOPNOTSUPP-for-IOCB_NOWAIT-like-EA.patch similarity index 100% rename from patches/kernel/0018-io_uring-rw-treat-EOPNOTSUPP-for-IOCB_NOWAIT-like-EA.patch rename to patches/kernel/0016-io_uring-rw-treat-EOPNOTSUPP-for-IOCB_NOWAIT-like-EA.patch diff --git a/patches/kernel/0019-netfs-reset-subreq-iov-iter-before-tail-clean.patch b/patches/kernel/0017-netfs-reset-subreq-iov-iter-before-tail-clean.patch similarity index 89% rename from patches/kernel/0019-netfs-reset-subreq-iov-iter-before-tail-clean.patch rename to patches/kernel/0017-netfs-reset-subreq-iov-iter-before-tail-clean.patch index 75270d8..cc4104b 100644 --- a/patches/kernel/0019-netfs-reset-subreq-iov-iter-before-tail-clean.patch +++ b/patches/kernel/0017-netfs-reset-subreq-iov-iter-before-tail-clean.patch @@ -15,10 +15,10 @@ Signed-off-by: Christian Ebner 1 file changed, 1 insertion(+) diff --git a/fs/netfs/io.c b/fs/netfs/io.c -index 4261ad6c55b6..27c9e441d21e 100644 +index aaff3844e9b7..e8a884040e2b 100644 --- a/fs/netfs/io.c +++ b/fs/netfs/io.c -@@ -516,6 +516,7 @@ void netfs_subreq_terminated(struct netfs_io_subrequest *subreq, +@@ -517,6 +517,7 @@ void netfs_subreq_terminated(struct netfs_io_subrequest *subreq, incomplete: if (test_bit(NETFS_SREQ_CLEAR_TAIL, &subreq->flags)) { diff --git a/patches/kernel/0020-x86-CPU-AMD-Clear-virtualized-VMLOAD-VMSAVE-on-Zen4-.patch b/patches/kernel/0018-x86-CPU-AMD-Clear-virtualized-VMLOAD-VMSAVE-on-Zen4-.patch similarity index 97% rename from patches/kernel/0020-x86-CPU-AMD-Clear-virtualized-VMLOAD-VMSAVE-on-Zen4-.patch rename to patches/kernel/0018-x86-CPU-AMD-Clear-virtualized-VMLOAD-VMSAVE-on-Zen4-.patch index bc15515..51ed9b9 100644 --- a/patches/kernel/0020-x86-CPU-AMD-Clear-virtualized-VMLOAD-VMSAVE-on-Zen4-.patch +++ b/patches/kernel/0018-x86-CPU-AMD-Clear-virtualized-VMLOAD-VMSAVE-on-Zen4-.patch @@ -21,7 +21,7 @@ Signed-off-by: Fiona Ebner 1 file changed, 11 insertions(+) diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c -index ca6096dcc5c6..e30f4896415d 100644 +index 809a66d522c1..edc1b32b5021 100644 --- a/arch/x86/kernel/cpu/amd.c +++ b/arch/x86/kernel/cpu/amd.c @@ -1061,6 +1061,17 @@ static void init_amd_zen4(struct cpuinfo_x86 *c)