Age | Commit message (Collapse) | Author | |
---|---|---|---|
2020-10-13 | Merge release-20200928.0-113-g7eeeff426 (automated) | gVisor bot | |
2020-10-13 | Merge pull request #4482 from lemin9538:lemin_arm64 | gVisor bot | |
PiperOrigin-RevId: 336976081 | |||
2020-10-13 | Merge pull request #4386 from lubinszARM:pr_testutil_tls_usr | gVisor bot | |
PiperOrigin-RevId: 336970511 | |||
2020-10-13 | Merge release-20200928.0-107-gb99f15e06 (automated) | gVisor bot | |
2020-10-13 | Merge pull request #4374 from lubinszARM:pr_ffmpeg_kvm_01 | gVisor bot | |
PiperOrigin-RevId: 336962937 | |||
2020-10-13 | Merge release-20200928.0-101-gd9b32efb3 (automated) | gVisor bot | |
2020-10-13 | Avoid excessive Tgkill and wait operations. | Adin Scannell | |
The required states may simply not be observed by the thread running bounce, so track guest and user generations to ensure that at least one of the desired state transitions happens. Fixes #3532 PiperOrigin-RevId: 336908216 | |||
2020-10-12 | Merge release-20200928.0-93-g93bc0777b (automated) | gVisor bot | |
2020-10-12 | Merge pull request #4072 from adamliyi:droppt_fix | gVisor bot | |
PiperOrigin-RevId: 336719900 | |||
2020-10-10 | arm64: set DZE bit to make EL0 can use DC ZVA | Min Le | |
Signed-off-by: Min Le <lemin.lm@antgroup.com> | |||
2020-10-09 | Merge release-20200928.0-86-ga0ffc84ad (automated) | gVisor bot | |
2020-10-09 | platform/kvm: remove the unused field | Andrei Vagin | |
PiperOrigin-RevId: 336366624 | |||
2020-10-09 | Merge release-20200928.0-84-g6df400dfb (automated) | gVisor bot | |
2020-10-09 | Merge pull request #4040 from lemin9538:lemin_arm64 | gVisor bot | |
PiperOrigin-RevId: 336362818 | |||
2020-10-08 | arm64: the mair_el1 value is wrong | Min Le | |
the correct value needed is 0xbbff440c0400 but the const defined is 0x000000000000ffc0 due to the operator error in _MT_EL1_INIT, both kernel and user space memory attribute should be Normal memory not DEVICE_nGnRE Signed-off-by: Min Le <lemin.lm@antgroup.com> | |||
2020-10-07 | Merge release-20200928.0-64-gb89e43e20 (automated) | gVisor bot | |
2020-10-07 | Merge pull request #4376 from lubinszARM:pr_usr_tls_new | gVisor bot | |
PiperOrigin-RevId: 335930035 | |||
2020-10-07 | Merge release-20200928.0-61-gecf9a7ef0 (automated) | gVisor bot | |
2020-10-07 | Add precise synchronization to KVM. | Adin Scannell | |
By using TSC scaling as a hack, we can trick the kernel into setting an offset of exactly zero. Huzzah! PiperOrigin-RevId: 335922019 | |||
2020-10-06 | Merge release-20200928.0-55-g1336af78d (automated) | gVisor bot | |
2020-10-06 | Implement membarrier(2) commands other than *_SYNC_CORE. | Jamie Liu | |
Updates #267 PiperOrigin-RevId: 335713923 | |||
2020-10-06 | Merge release-20200928.0-47-g8ef7cebcb (automated) | gVisor bot | |
2020-10-05 | Merge pull request #4079 from lemin9538:arm64_fix | gVisor bot | |
PiperOrigin-RevId: 335532690 | |||
2020-10-02 | Merge release-20200921.0-106-g55f835d1f (automated) | gVisor bot | |
2020-10-02 | kvm/x86: handle a case when interrupts are enabled in the kernel space | Andrei Vagin | |
Before we thought that interrupts are always disabled in the kernel space, but here is a case when goruntime switches on a goroutine which has been saved in the host mode. On restore, the popf instruction is used to restore flags and this means that all flags what the goroutine has in the host mode will be restored in the kernel mode. And in the host mode, interrupts are always enabled. The long story short, we can't use the IF flag for determine whether a tasks is running in user or kernel mode. This patch reworks the code so that in userspace, the first bit of the IOPL flag will be always set. This doesn't give any new privilidges for a task because CPL in userspace is always 3. But then we can use this flag to distinguish user and kernel modes. The IOPL flag is never set in the kernel and host modes. Reported-by: syzbot+5036b325a8eb15c030cf@syzkaller.appspotmail.com Reported-by: syzbot+034d580e89ad67b8dc75@syzkaller.appspotmail.com Signed-off-by: Andrei Vagin <avagin@gmail.com> | |||
2020-09-30 | arm64 kvm: fix panic in kvm.dropPageTables | Yi Li | |
Related with issue #3019, #4056. When running hello-world with gvisor-kvm, there is panic when exits: " panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x3c0 pc=0x7c3f18] goroutine 284 [running]: ... ... gvisor.dev/gvisor/pkg/sentry/platform/kvm.(*machine).dropPageTables(0x4000166840, 0x400032a040) pkg/sentry/platform/kvm/machine_arm64.go:111 +0x88 fp=0x4000479e00 sp=0x4000479da0 pc=0x7c3f18 " Also make dropPageTables() arch independent. | |||
2020-09-30 | Merge release-20200921.0-89-g9751044a9 (automated) | gVisor bot | |
2020-09-30 | Merge pull request #2256 from laijs:kpti | gVisor bot | |
PiperOrigin-RevId: 334674481 | |||
2020-09-30 | arm64 kvm: add a test case for kernel-tls checking | Bin Lu | |
Signed-off-by: Bin Lu <bin.lu@arm.com> | |||
2020-09-29 | arm64 kvm: keep sentry-tls and usr-tls separately | Bin Lu | |
Currently there is a problem with the preservation of usr-tls, which leads to the contamination of sentry tls. Signed-off-by: Bin Lu <bin.lu@arm.com> | |||
2020-09-29 | arm64 kvm: remove some redundant codes to improve the preformance | Bin Lu | |
Signed-off-by: Bin Lu <bin.lu@arm.com> | |||
2020-09-25 | make sure use the kernel space after change ASID | Min Le | |
after the SWITCH_TO_APP_PAGETABLE, the ASID is changed to the application ASID, but there are still some instruction before ERET, since these instruction is not use the kernel address space, it may use the application's TLB, which will cause fault, this patch can make sure that after SWITCH_TO_APP_PAGETABLE sentry is still use kernel address space which is mapped as Global. Signed-off-by: Min Le <lemin.lm@antgroup.com> | |||
2020-09-23 | Merge release-20200914.0-138-gd00207ff4 (automated) | gVisor bot | |
2020-09-23 | Merge release-20200914.0-137-g99decaadd (automated) | gVisor bot | |
2020-09-23 | Merge release-20200914.0-136-gb54dbdfdc (automated) | gVisor bot | |
2020-09-23 | Merge release-20200914.0-135-gc0f21bb19 (automated) | gVisor bot | |
2020-09-22 | Merge release-20200914.0-132-g778c36717 (automated) | gVisor bot | |
2020-09-22 | Merge release-20200914.0-131-g6e5ea605f (automated) | gVisor bot | |
2020-09-22 | Merge release-20200914.0-129-gf134f873f (automated) | gVisor bot | |
2020-09-22 | arm64: set SCTLR_UCI bit in SCTLR_EL1 | Min Le | |
some application such as openjdk will excute DC CVAU at el0, if SCTLR_UCI is not set, it will trap to EL1 which will cause panic. Signed-off-by: Min Le <lemin.lm@antgroup.com> | |||
2020-09-22 | Merge release-20200914.0-128-g742e58b87 (automated) | gVisor bot | |
2020-09-21 | Merge release-20200914.0-127-g059d90b9f (automated) | gVisor bot | |
2020-09-21 | Merge release-20200914.0-126-g73f3a34b5 (automated) | gVisor bot | |
2020-09-21 | Merge release-20200914.0-123-ga129204cf (automated) | gVisor bot | |
2020-09-21 | Merge release-20200914.0-122-gd72022373 (automated) | gVisor bot | |
2020-09-21 | Merge release-20200907.0-159-ge09d78f01 (automated) | gVisor bot | |
2020-09-21 | Merge release-20200907.0-158-g5ce588295 (automated) | gVisor bot | |
2020-09-21 | Merge release-20200907.0-157-gca3087472 (automated) | gVisor bot | |
2020-09-19 | Merge release-20200907.0-154-g916751039 (automated) | gVisor bot | |
2020-09-18 | Merge release-20200907.0-153-g4ba86e625 (automated) | gVisor bot | |