linux/arch/i386
H. Peter Anvin 4ee5b10abe [x86 setup] Correct the SMAP check for INT 0x15, AX=0xe820
The e820 probe code was checking %edx, not %eax, for the SMAP
signature on return.  This worked on *almost* all systems, since %edx
still contained SMAP from the call on entry, but on a handful of
systems it failed -- plus, we would have missed real mismatches.

The error output is "=d" to make sure gcc knows %edx is clobbered
here.

Signed-off-by: H. Peter Anvin <hpa@zytor.com>
2007-09-28 10:12:44 -07:00
..
boot [x86 setup] Correct the SMAP check for INT 0x15, AX=0xe820 2007-09-28 10:12:44 -07:00
crypto
kernel [acpi] Correct the decoding of video mode numbers in wakeup.S 2007-09-20 11:06:58 -07:00
lib
mach-default
mach-es7000
mach-generic i386: Fix leak of ../kernel from top level 2007-09-12 09:28:06 -07:00
mach-visws
mach-voyager i386: Fix leak of ../kernel from top level 2007-09-12 09:28:06 -07:00
math-emu
mm revert "highmem: catch illegal nesting" 2007-09-11 17:21:27 -07:00
oprofile
pci PCI: irq and pci_ids patch for Intel Tolapai 2007-09-11 04:22:17 -07:00
power
video
xen xen: execve's error paths don't pin the mm before unpinning 2007-09-26 09:27:14 -07:00
defconfig
Kconfig i386: Mark NUMA support experimental 2007-08-21 10:06:44 -07:00
Kconfig.cpu
Kconfig.debug
Makefile x86_64: Check for .cfi_rel_offset in CFI probe 2007-08-18 10:25:25 -07:00
Makefile.cpu