[PATCH 22/22] KVM: SVM: Expect two more candiates for exit_int_info
This patch adds INTR and NMI intercepts to the list of expected intercepts with an exit_int_info set. While this can't happen on bare metal it is architectural legal and may happen with KVMs SVM emulation. Signed-off-by: Joerg Roedel <joerg.roedel(a)amd.com> --- arch/x86/kvm/svm.c | 3 ++- 1 files changed, 2... 27 Apr 2010 07:38
[PATCH 21/22] KVM: SVM: Report Nested Paging support to userspace
This patch implements the reporting of the nested paging feature support to userspace. Signed-off-by: Joerg Roedel <joerg.roedel(a)amd.com> --- arch/x86/kvm/svm.c | 7 ++++++- 1 files changed, 6 insertions(+), 1 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 266b1d4..6d6b300 100644... 27 Apr 2010 07:38
[PATCH 15/22] KVM: MMU: Introduce kvm_read_guest_page_x86()
This patch introduces the kvm_read_guest_page_x86 function which reads from the physical memory of the guest. If the guest is running in guest-mode itself with nested paging enabled it will read from the guest's guest physical memory instead. The patch also changes changes the code to use this function where it i... 27 Apr 2010 07:38
param sysfs oops (simple, leaky) fix, bool arrays fix
On Thu, 2009-10-29 at 09:02 +1030, Rusty Russell wrote: (Thanks to Takashi-san, who found the oops and kept reading the code to spot the others. A more complete fix is pending, but this works for 2.6.32 and -stable: see commit message and FIXME in code.) The following changes since commit 964fe080d94... 6 May 2010 03:06
[PATCH] x86, amd: Check X86_FEATURE_OSVW bit before accessing OSVW MSRs
If host CPU is exposed to a guest the OSVW MSRs are not guaranteed to be present and a GP fault occurs. Thus checking the feature flag is essential. Cc: <stable(a)kernel.org> # .32.x .33.x Signed-off-by: Andreas Herrmann <andreas.herrmann3(a)amd.com> --- arch/x86/kernel/process.c | 12 +++++++----- 1 files chan... 27 Apr 2010 06:32
Doublecheck for CONFIG_64
On Mon, Apr 26, 2010 at 04:06:18PM +0200, Christoph Egger wrote: THis is a check for CONFIG_64 inside a block that is only active when CONFIG_64 is set. So the check is actually useless and potentially irritation. --- a/arch/s390/kernel/vdso.c +++ b/arch/s390/kernel/vdso.c @@ -102,11 +102,7 @@ sta... 27 Apr 2010 06:32
KEYS: The request_key() syscall should link an existing key to the dest keyring
Andrew Morton <akpm(a)linux-foundation.org> wrote: I don't think I understand that description. Are you saying that the patch switches things from the first example output into the second case? request_key() system call is meant to recursively search all your keyrings for the key you desire, and, optionally,... 28 Apr 2010 11:43
Staging: batman-adv: fixed comments to maintain 80 char limit
Mark wrote: This patches types.h to make sure the comments adhere to the 80 char limit and make checkpatch.pl happy Your patch doesn't apply anymore. See 1270341625-28764-1-git-send-email-luisbg(a)ubuntu.com and follow ups [1]. Best regards, Sven Eckelmann [1] https://lists.open-mesh.org/pipermail/b.a.t... 27 Apr 2010 06:32
[PATCH] Staging: batman-adv: fixed comments to maintain 80 char limit
This patches types.h to make sure the comments adhere to the 80 char limit and make checkpatch.pl happy Signed-off-by: Mark Rankilor <reodge(a)gmail.com> --- drivers/staging/batman-adv/types.h | 17 +++++++++++------ 1 files changed, 11 insertions(+), 6 deletions(-) diff --git a/drivers/staging/batman-adv/ty... 27 Apr 2010 06:31
[PATCH 08/10] v4l: always use unlocked_ioctl
From: Arnd Bergmann <arnd(a)arndb.de> v4l drivers may still use a locked ioctl method, but we now always export an unlocked_ioctl and lock ourselves, so that the ->ioctl file operation can get removed. Signed-off-by: Arnd Bergmann <arnd(a)arndb.de> Fixed merge conflicts that result from having applied Linus's ... 27 Apr 2010 06:31