<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/arch, branch v2.6.32.15</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/arch?h=v2.6.32.15</id>
<link rel='self' href='https://git.amat.us/linux/atom/arch?h=v2.6.32.15'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2010-05-26T21:29:22Z</updated>
<entry>
<title>Revert "parisc: Set PCI CLS early in boot."</title>
<updated>2010-05-26T21:29:22Z</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@suse.de</email>
</author>
<published>2010-05-24T21:58:13Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=763f2ee657b24124d7a0b561b61bdb26231b0169'/>
<id>urn:sha1:763f2ee657b24124d7a0b561b61bdb26231b0169</id>
<content type='text'>
This reverts the following patch, which shouldn't have been applied
to the .32 stable tree as it causes problems.


  commit 5fd4514bb351b5ecb0da3692fff70741e5ed200c upstream.

  Set the PCI CLS early in the boot process to prevent
  device failures. In pcibios_set_master use the new
  pci_cache_line_size instead of a hard-coded value.

  Signed-off-by: Carlos O'Donell &lt;carlos@codesourcery.com&gt;
  Reviewed-by: Grant Grundler &lt;grundler@google.com&gt;
  Signed-off-by: Kyle McMartin &lt;kyle@redhat.com&gt;
  Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;


Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>x86, amd: Check X86_FEATURE_OSVW bit before accessing OSVW MSRs</title>
<updated>2010-05-26T21:29:18Z</updated>
<author>
<name>Andreas Herrmann</name>
<email>herrmann.der.user@googlemail.com</email>
</author>
<published>2010-04-27T10:13:48Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f46c7299a930469f51e30b7be281c33630917244'/>
<id>urn:sha1:f46c7299a930469f51e30b7be281c33630917244</id>
<content type='text'>
commit f01487119dda3d9f58c9729c7361ecc50a61c188 upstream.

If host CPU is exposed to a guest the OSVW MSRs are not guaranteed
to be present and a GP fault occurs. Thus checking the feature flag is
essential.

Signed-off-by: Andreas Herrmann &lt;andreas.herrmann3@amd.com&gt;
LKML-Reference: &lt;20100427101348.GC4489@alberich.amd.com&gt;
Signed-off-by: H. Peter Anvin &lt;hpa@linux.intel.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>x86, cacheinfo: Turn off L3 cache index disable feature in virtualized environments</title>
<updated>2010-05-26T21:29:18Z</updated>
<author>
<name>Frank Arnold</name>
<email>frank.arnold@amd.com</email>
</author>
<published>2010-04-22T14:06:59Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=798e99d358157dfcec37c1b0b911ed711d0e0da6'/>
<id>urn:sha1:798e99d358157dfcec37c1b0b911ed711d0e0da6</id>
<content type='text'>
commit 7f284d3cc96e02468a42e045f77af11e5ff8b095 upstream.

When running a quest kernel on xen we get:

BUG: unable to handle kernel NULL pointer dereference at 0000000000000038
IP: [&lt;ffffffff8142f2fb&gt;] cpuid4_cache_lookup_regs+0x2ca/0x3df
PGD 0
Oops: 0000 [#1] SMP
last sysfs file:
CPU 0
Modules linked in:

Pid: 0, comm: swapper Tainted: G        W  2.6.34-rc3 #1 /HVM domU
RIP: 0010:[&lt;ffffffff8142f2fb&gt;]  [&lt;ffffffff8142f2fb&gt;] cpuid4_cache_lookup_regs+0x
2ca/0x3df
RSP: 0018:ffff880002203e08  EFLAGS: 00010046
RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000060
RDX: 0000000000000000 RSI: 0000000000000040 RDI: 0000000000000000
RBP: ffff880002203ed8 R08: 00000000000017c0 R09: ffff880002203e38
R10: ffff8800023d5d40 R11: ffffffff81a01e28 R12: ffff880187e6f5c0
R13: ffff880002203e34 R14: ffff880002203e58 R15: ffff880002203e68
FS:  0000000000000000(0000) GS:ffff880002200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000038 CR3: 0000000001a3c000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process swapper (pid: 0, threadinfo ffffffff81a00000, task ffffffff81a44020)
Stack:
 ffffffff810d7ecb ffff880002203e20 ffffffff81059140 ffff880002203e30
&lt;0&gt; ffffffff810d7ec9 0000000002203e40 000000000050d140 ffff880002203e70
&lt;0&gt; 0000000002008140 0000000000000086 ffff880040020140 ffffffff81068b8b
Call Trace:
 &lt;IRQ&gt;
 [&lt;ffffffff810d7ecb&gt;] ? sync_supers_timer_fn+0x0/0x1c
 [&lt;ffffffff81059140&gt;] ? mod_timer+0x23/0x25
 [&lt;ffffffff810d7ec9&gt;] ? arm_supers_timer+0x34/0x36
 [&lt;ffffffff81068b8b&gt;] ? hrtimer_get_next_event+0xa7/0xc3
 [&lt;ffffffff81058e85&gt;] ? get_next_timer_interrupt+0x19a/0x20d
 [&lt;ffffffff8142fa23&gt;] get_cpu_leaves+0x5c/0x232
 [&lt;ffffffff8106a7b1&gt;] ? sched_clock_local+0x1c/0x82
 [&lt;ffffffff8106a9a0&gt;] ? sched_clock_tick+0x75/0x7a
 [&lt;ffffffff8107748c&gt;] generic_smp_call_function_single_interrupt+0xae/0xd0
 [&lt;ffffffff8101f6ef&gt;] smp_call_function_single_interrupt+0x18/0x27
 [&lt;ffffffff8100a773&gt;] call_function_single_interrupt+0x13/0x20
 &lt;EOI&gt;
 [&lt;ffffffff8143c468&gt;] ? notifier_call_chain+0x14/0x63
 [&lt;ffffffff810295c6&gt;] ? native_safe_halt+0xc/0xd
 [&lt;ffffffff810114eb&gt;] ? default_idle+0x36/0x53
 [&lt;ffffffff81008c22&gt;] cpu_idle+0xaa/0xe4
 [&lt;ffffffff81423a9a&gt;] rest_init+0x7e/0x80
 [&lt;ffffffff81b10dd2&gt;] start_kernel+0x40e/0x419
 [&lt;ffffffff81b102c8&gt;] x86_64_start_reservations+0xb3/0xb7
 [&lt;ffffffff81b103c4&gt;] x86_64_start_kernel+0xf8/0x107
Code: 14 d5 40 ff ae 81 8b 14 02 31 c0 3b 15 47 1c 8b 00 7d 0e 48 8b 05 36 1c 8b
 00 48 63 d2 48 8b 04 d0 c7 85 5c ff ff ff 00 00 00 00 &lt;8b&gt; 70 38 48 8d 8d 5c ff
 ff ff 48 8b 78 10 ba c4 01 00 00 e8 eb
RIP  [&lt;ffffffff8142f2fb&gt;] cpuid4_cache_lookup_regs+0x2ca/0x3df
 RSP &lt;ffff880002203e08&gt;
CR2: 0000000000000038
---[ end trace a7919e7f17c0a726 ]---

The L3 cache index disable feature of AMD CPUs has to be disabled if the
kernel is running as guest on top of a hypervisor because northbridge
devices are not available to the guest. Currently, this fixes a boot
crash on top of Xen. In the future this will become an issue on KVM as
well.

Check if northbridge devices are present and do not enable the feature
if there are none.

[ hpa: backported to 2.6.34 ]

Signed-off-by: Frank Arnold &lt;frank.arnold@amd.com&gt;
LKML-Reference: &lt;1271945222-5283-3-git-send-email-bp@amd64.org&gt;
Acked-by: Borislav Petkov &lt;borislav.petkov@amd.com&gt;
Signed-off-by: H. Peter Anvin &lt;hpa@zytor.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>x86, k8: Fix build error when K8_NB is disabled</title>
<updated>2010-05-26T21:29:18Z</updated>
<author>
<name>Borislav Petkov</name>
<email>borislav.petkov@amd.com</email>
</author>
<published>2010-04-24T07:56:53Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b53d27ff66e343520df4d287c419235fbe6e3fea'/>
<id>urn:sha1:b53d27ff66e343520df4d287c419235fbe6e3fea</id>
<content type='text'>
commit ade029e2aaacc8965a548b0b0f80c5bee97ffc68 upstream.

K8_NB depends on PCI and when the last is disabled (allnoconfig) we fail
at the final linking stage due to missing exported num_k8_northbridges.
Add a header stub for that.

Signed-off-by: Borislav Petkov &lt;borislav.petkov@amd.com&gt;
LKML-Reference: &lt;20100503183036.GJ26107@aftab&gt;
Signed-off-by: H. Peter Anvin &lt;hpa@zytor.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>powerpc/perf_event: Fix oops due to perf_event_do_pending call</title>
<updated>2010-05-26T21:29:16Z</updated>
<author>
<name>Paul Mackerras</name>
<email>paulus@samba.org</email>
</author>
<published>2010-04-13T20:46:04Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=73ef533de7533fcf514403125a0d4747d3390317'/>
<id>urn:sha1:73ef533de7533fcf514403125a0d4747d3390317</id>
<content type='text'>
commit 0fe1ac48bef018bed896307cd12f6ca9b5e704ab upstream.

Anton Blanchard found that large POWER systems would occasionally
crash in the exception exit path when profiling with perf_events.
The symptom was that an interrupt would occur late in the exit path
when the MSR[RI] (recoverable interrupt) bit was clear.  Interrupts
should be hard-disabled at this point but they were enabled.  Because
the interrupt was not recoverable the system panicked.

The reason is that the exception exit path was calling
perf_event_do_pending after hard-disabling interrupts, and
perf_event_do_pending will re-enable interrupts.

The simplest and cleanest fix for this is to use the same mechanism
that 32-bit powerpc does, namely to cause a self-IPI by setting the
decrementer to 1.  This means we can remove the tests in the exception
exit path and raw_local_irq_restore.

This also makes sure that the call to perf_event_do_pending from
timer_interrupt() happens within irq_enter/irq_exit.  (Note that
calling perf_event_do_pending from timer_interrupt does not mean that
there is a possible 1/HZ latency; setting the decrementer to 1 ensures
that the timer interrupt will happen immediately, i.e. within one
timebase tick, which is a few nanoseconds or 10s of nanoseconds.)

Signed-off-by: Paul Mackerras &lt;paulus@samba.org&gt;
Signed-off-by: Benjamin Herrenschmidt &lt;benh@kernel.crashing.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>ptrace: fix return value of do_syscall_trace_enter()</title>
<updated>2010-05-26T21:29:16Z</updated>
<author>
<name>Gerald Schaefer</name>
<email>gerald.schaefer@de.ibm.com</email>
</author>
<published>2010-05-12T07:32:12Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=fa157eec79e78a875790df6faf53b3501c33a462'/>
<id>urn:sha1:fa157eec79e78a875790df6faf53b3501c33a462</id>
<content type='text'>
commit 545c174d1f093a462b4bb9131b23d5ea72a600e1 upstream.

strace may change the system call number, so regs-&gt;gprs[2] must not
be read before tracehook_report_syscall_entry(). This fixes a bug
where "strace -f" will hang after a vfork().

Signed-off-by: Gerald Schaefer &lt;gerald.schaefer@de.ibm.com&gt;
Signed-off-by: Martin Schwidefsky &lt;schwidefsky@de.ibm.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>MIPS: Sibyte: Apply M3 workaround only on affected chip types and versions.</title>
<updated>2010-05-12T21:57:17Z</updated>
<author>
<name>Ralf Baechle</name>
<email>ralf@linux-mips.org</email>
</author>
<published>2010-04-23T01:56:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=1b4b25fb9a90f7fe755d47f0beb48da75ddcd38e'/>
<id>urn:sha1:1b4b25fb9a90f7fe755d47f0beb48da75ddcd38e</id>
<content type='text'>
(cherry picked from commit e65c7f33d75e977350ca350573d93c517ec02776)

Previously it was unconditionally used on all Sibyte family SOCs.  The
M3 bug has to be handled in the TLB exception handler which is extremly
performance sensitive, so this modification is expected to deliver around
2-3% performance improvment.  This is important as required changes to the
M3 workaround will make it more costly.

Signed-off-by: Ralf Baechle &lt;ralf@linux-mips.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>pxa/colibri: fix missing #include &lt;mach/mfp.h&gt; in colibri.h</title>
<updated>2010-05-12T21:57:16Z</updated>
<author>
<name>Jakob Viketoft</name>
<email>jakob.viketoft@bitsim.com</email>
</author>
<published>2010-05-05T10:25:27Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=5a1b8c2d73537fcae20b9d31d2e46504b64d4f52'/>
<id>urn:sha1:5a1b8c2d73537fcae20b9d31d2e46504b64d4f52</id>
<content type='text'>
commit ccb8d8d070b8f25f0163da5c9ceacf63a5169540 upstream.

The use of mfp_cfg_t causes build errors without including &lt;mach/mfp.h&gt;.

CC: Daniel Mack &lt;daniel@caiaq.de&gt;
Signed-off-by: Jakob Viketoft &lt;jakob.viketoft@bitsim.com&gt;
Signed-off-by: Eric Miao &lt;eric.y.miao@gmail.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>parisc: Set PCI CLS early in boot.</title>
<updated>2010-05-12T21:57:13Z</updated>
<author>
<name>Carlos O'Donell</name>
<email>carlos@codesourcery.com</email>
</author>
<published>2010-02-22T23:25:59Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=5d233bf3dcad483e5f89865aaf5973e67c1630b1'/>
<id>urn:sha1:5d233bf3dcad483e5f89865aaf5973e67c1630b1</id>
<content type='text'>
commit 5fd4514bb351b5ecb0da3692fff70741e5ed200c upstream.

Set the PCI CLS early in the boot process to prevent
device failures. In pcibios_set_master use the new
pci_cache_line_size instead of a hard-coded value.

Signed-off-by: Carlos O'Donell &lt;carlos@codesourcery.com&gt;
Reviewed-by: Grant Grundler &lt;grundler@google.com&gt;
Signed-off-by: Kyle McMartin &lt;kyle@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>kgdb: don't needlessly skip PAGE_USER test for Fsl booke</title>
<updated>2010-05-12T21:57:12Z</updated>
<author>
<name>Wufei</name>
<email>fei.wu@windriver.com</email>
</author>
<published>2010-04-28T21:42:32Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=150d8a1fe2e89b124bc5bc3628095b8db2435272'/>
<id>urn:sha1:150d8a1fe2e89b124bc5bc3628095b8db2435272</id>
<content type='text'>
commit 56151e753468e34aeb322af4b0309ab727c97d2e upstream.

The bypassing of this test is a leftover from 2.4 vintage
kernels, and is no longer appropriate, or even used by KGDB.
Currently KGDB uses probe_kernel_write() for all access to
memory via the KGDB core, so it can simply be deleted.

This fixes CVE-2010-1446.

CC: Benjamin Herrenschmidt &lt;benh@kernel.crashing.org&gt;
CC: Paul Mackerras &lt;paulus@samba.org&gt;
CC: Kumar Gala &lt;galak@kernel.crashing.org&gt;
Signed-off-by: Wufei &lt;fei.wu@windriver.com&gt;
Signed-off-by: Jason Wessel &lt;jason.wessel@windriver.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
</feed>
