<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git, branch v2.6.34.1</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v2.6.34.1</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v2.6.34.1'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2010-07-05T18:24:10Z</updated>
<entry>
<title>Linux 2.6.34.1</title>
<updated>2010-07-05T18:24:10Z</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@suse.de</email>
</author>
<published>2010-07-05T18:24:10Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=3db48f5c1a68e801146ca58ff94f3898c6fbf90e'/>
<id>urn:sha1:3db48f5c1a68e801146ca58ff94f3898c6fbf90e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>parisc: clear floating point exception flag on SIGFPE signal</title>
<updated>2010-07-05T18:23:07Z</updated>
<author>
<name>Helge Deller</name>
<email>deller@gmx.de</email>
</author>
<published>2010-05-03T20:44:21Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=447926d82934a627152b3841b8014b5b9e01d48d'/>
<id>urn:sha1:447926d82934a627152b3841b8014b5b9e01d48d</id>
<content type='text'>
commit 550f0d922286556c7ea43974bb7921effb5a5278 upstream.

Clear the floating point exception flag before returning to
user space. This is needed, else the libc trampoline handler
may hit the same SIGFPE again while building up a trampoline
to a signal handler.

Fixes debian bug #559406.

Signed-off-by: Helge Deller &lt;deller@gmx.de&gt;
Signed-off-by: Kyle McMartin &lt;kyle@mcmartin.ca&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>drm/i915: Don't touch PORT_HOTPLUG_EN in intel_dp_detect()</title>
<updated>2010-07-05T18:23:07Z</updated>
<author>
<name>Karsten Wiese</name>
<email>fzuuzf@googlemail.com</email>
</author>
<published>2010-03-27T21:48:33Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=36346c14bde58f34c0a2df91635895f943eeb58b'/>
<id>urn:sha1:36346c14bde58f34c0a2df91635895f943eeb58b</id>
<content type='text'>
commit 6e0032f0ae4440e75256bee11b163552cae21962 upstream.

PORT_HOTPLUG_EN has allready been setup in i915_driver_irq_postinstall(),
when intel_dp_detect() runs.

Delete the DP[BCD]_HOTPLUG_INT_EN defines, they are not referenced anymore.

I found this while searching for a fix for
        https://bugzilla.redhat.com/show_bug.cgi?id=528312

Signed-off-by: Karsten Wiese &lt;fzu@wemgehoertderstaat.de&gt;
Signed-off-by: Eric Anholt &lt;eric@anholt.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>KVM: SVM: Don't allow nested guest to VMMCALL into host</title>
<updated>2010-07-05T18:23:06Z</updated>
<author>
<name>Joerg Roedel</name>
<email>joerg.roedel@amd.com</email>
</author>
<published>2010-05-05T14:04:45Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=87557bf5f6a941708534ae8f5f83cd68988d5063'/>
<id>urn:sha1:87557bf5f6a941708534ae8f5f83cd68988d5063</id>
<content type='text'>
This patch disables the possibility for a l2-guest to do a
VMMCALL directly into the host. This would happen if the
l1-hypervisor doesn't intercept VMMCALL and the l2-guest
executes this instruction.

Signed-off-by: Joerg Roedel &lt;joerg.roedel@amd.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

(Cherry-picked from commit 0d945bd9351199744c1e89d57a70615b6ee9f394)
</content>
</entry>
<entry>
<title>KVM: x86: Inject #GP with the right rip on efer writes</title>
<updated>2010-07-05T18:23:05Z</updated>
<author>
<name>Joerg Roedel</name>
<email>joerg.roedel@amd.com</email>
</author>
<published>2010-05-06T09:38:43Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=ce9fea841204616bc21fe42bdfbd60db8ae12d9e'/>
<id>urn:sha1:ce9fea841204616bc21fe42bdfbd60db8ae12d9e</id>
<content type='text'>
This patch fixes a bug in the KVM efer-msr write path. If a
guest writes to a reserved efer bit the set_efer function
injects the #GP directly. The architecture dependent wrmsr
function does not see this, assumes success and advances the
rip. This results in a #GP in the guest with the wrong rip.
This patch fixes this by reporting efer write errors back to
the architectural wrmsr function.

Signed-off-by: Joerg Roedel &lt;joerg.roedel@amd.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

(Cherry-picked from commit b69e8caef5b190af48c525f6d715e7b7728a77f6)
</content>
</entry>
<entry>
<title>KVM: x86: Add missing locking to arch specific vcpu ioctls</title>
<updated>2010-07-05T18:23:04Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-05-13T08:50:19Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=8d3c865a11cc027bee53985237e12b086a6d7f41'/>
<id>urn:sha1:8d3c865a11cc027bee53985237e12b086a6d7f41</id>
<content type='text'>
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

(Cherry-picked from commit 8fbf065d625617bbbf6b72d5f78f84ad13c8b547)
</content>
</entry>
<entry>
<title>KVM: PPC: Add missing vcpu_load()/vcpu_put() in vcpu ioctls</title>
<updated>2010-07-05T18:23:03Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-05-13T08:05:49Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=548d65e9b09a7321e2da125acae765d1e902b6cd'/>
<id>urn:sha1:548d65e9b09a7321e2da125acae765d1e902b6cd</id>
<content type='text'>
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

(Cherry-picked from commit 98001d8d017cea1ee0f9f35c6227bbd63ef5005b)
</content>
</entry>
<entry>
<title>KVM: Fix wallclock version writing race</title>
<updated>2010-07-05T18:23:03Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-05-04T12:00:37Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=0119618803088bf8be6f287fc0e160e4a08fbfa6'/>
<id>urn:sha1:0119618803088bf8be6f287fc0e160e4a08fbfa6</id>
<content type='text'>
Wallclock writing uses an unprotected global variable to hold the version;
this can cause one guest to interfere with another if both write their
wallclock at the same time.

Acked-by: Glauber Costa &lt;glommer@redhat.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

(Cherry-picked from commit 9ed3c444ab8987c7b219173a2f7807e3f71e234e)
</content>
</entry>
<entry>
<title>KVM: MMU: Don't read pdptrs with mmu spinlock held in mmu_alloc_roots</title>
<updated>2010-07-05T18:23:03Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2010-05-04T09:58:32Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=e995b3b2f8e5447928c7754f0702f05cc75646f6'/>
<id>urn:sha1:e995b3b2f8e5447928c7754f0702f05cc75646f6</id>
<content type='text'>
On svm, kvm_read_pdptr() may require reading guest memory, which can sleep.

Push the spinlock into mmu_alloc_roots(), and only take it after we've read
the pdptr.

Tested-by: Joerg Roedel &lt;joerg.roedel@amd.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

(Cherry-picked from commit 8facbbff071ff2b19268d3732e31badc60471e21)
</content>
</entry>
<entry>
<title>KVM: VMX: enable VMXON check with SMX enabled (Intel TXT)</title>
<updated>2010-07-05T18:23:02Z</updated>
<author>
<name>Shane Wang</name>
<email>shane.wang@intel.com</email>
</author>
<published>2010-04-29T16:09:01Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=89e16408cedfeac6b7289397074bd9b44a594034'/>
<id>urn:sha1:89e16408cedfeac6b7289397074bd9b44a594034</id>
<content type='text'>
Per document, for feature control MSR:

  Bit 1 enables VMXON in SMX operation. If the bit is clear, execution
        of VMXON in SMX operation causes a general-protection exception.
  Bit 2 enables VMXON outside SMX operation. If the bit is clear, execution
        of VMXON outside SMX operation causes a general-protection exception.

This patch is to enable this kind of check with SMX for VMXON in KVM.

Signed-off-by: Shane Wang &lt;shane.wang@intel.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

(Cherry-picked from commit cafd66595d92591e4bd25c3904e004fc6f897e2d)
</content>
</entry>
</feed>
