Timestamp:
08/24/2022 08:42:48 AM (20 months ago)
Author:
Xi Ruoyao <xry111@…>
Branches:
11.2, 11.3, 11.3-rc1, 12.0, 12.0-rc1, 12.1, 12.1-rc1, bdubbs/gcc13, multilib, renodr/libudev-from-systemd, trunk, xry111/arm64, xry111/arm64-12.0, xry111/clfs-ng, xry111/loongarch, xry111/loongarch-12.0, xry111/loongarch-12.1, xry111/mips64el, xry111/pip3, xry111/rust-wip-20221008, xry111/update-glibc
Children:
098f4de
Parents:
20007e5
git-author:
Xi Ruoyao <xry111@…> (08/24/2022 08:25:19 AM)
git-committer:
Xi Ruoyao <xry111@…> (08/24/2022 08:42:48 AM)
Message:

linux kernel: enable CONFIG_X86_X2APIC

It's recommended for CVE-2022-21233 mitigation. And, if the BIOS has
enabled x2APIC but CONFIG_X86_X2APIC=n, the kernel will panic on boot.

If x2APIC is disabled or not available, the kernel with
CONFIG_X86_X2APIC=y can still boot normally.

No need to tag anything again because interrupt handling cannot affect
userspace.

(No files)

Note: See TracChangeset for help on using the changeset viewer.