lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4C57D38D.2090400@redhat.com>
Date:	Tue, 03 Aug 2010 11:30:05 +0300
From:	Avi Kivity <avi@...hat.com>
To:	Linus Torvalds <torvalds@...ux-foundation.org>,
	KVM list <kvm@...r.kernel.org>,
	linux-kernel <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] KVM updates for the 2.6.36 merge window

  Linus, please pull from

   git://git.kernel.org/pub/scm/virt/kvm/kvm.git kvm-updates/2.6.36

to receive the KVM updates for the 2.6.36 cycle.  No major features: 
mostly improved mmu and emulator correctness, some performance 
improvements, and support for guest XSAVE and AVX.

Alex Williamson (1):
       KVM: remove CAP_SYS_RAWIO requirement from kvm_vm_ioctl_assign_irq

Alexander Graf (5):
       KVM: PPC: Remove obsolete kvmppc_mmu_find_pte
       KVM: PPC: Use kernel hash function
       KVM: PPC: Make BAT only guest segments work
       KVM: PPC: Add generic hpte management functions
       KVM: PPC: Make use of hash based Shadow MMU

Andi Kleen (2):
       KVM: Fix KVM_SET_SIGNAL_MASK with arg == NULL
       KVM: Fix unused but set warnings

Andrea Arcangeli (1):
       KVM: MMU: fix mmu notifier invalidate handler for huge spte

Andreas Schwab (1):
       KVM: PPC: elide struct thread_struct instances from stack

Asias He (1):
       KVM: PPC: fix uninitialized variable warning in 
kvm_ppc_core_deliver_interrupts

Avi Kivity (50):
       KVM: VMX: Simplify vmx_get_nmi_mask()
       KVM: kvm_pdptr_read() may sleep
       KVM: VMX: Avoid writing HOST_CR0 every entry
       KVM: Get rid of KVM_REQ_KICK
       KVM: Document KVM_SET_IDENTITY_MAP ioctl
       KVM: Document KVM_SET_BOOT_CPU_ID
       KVM: MMU: Fix free memory accounting race in mmu_alloc_roots()
       KVM: move vcpu locking to dispatcher for generic vcpu ioctls
       KVM: x86: Lock arch specific vcpu ioctls centrally
       KVM: s390: Centrally lock arch specific vcpu ioctls
       KVM: PPC: Centralize locking of arch specific vcpu ioctls
       KVM: Consolidate arch specific vcpu ioctl locking
       KVM: Update Red Hat copyrights
       KVM: MMU: Allow spte.w=1 for gpte.w=0 and cr0.wp=0 only in shadow 
mode
       KVM: MMU: Document cr0.wp emulation
       KVM: MMU: Document large pages
       KVM: VMX: Fix incorrect rcu deref in rmode_tss_base()
       KVM: Fix mov cr0 #GP at wrong instruction
       KVM: Fix mov cr4 #GP at wrong instruction
       KVM: Fix mov cr3 #GP at wrong instruction
       KVM: Fix xsave and xcr save/restore memory leak
       KVM: Consolidate load/save temporary buffer allocation and freeing
       KVM: Remove memory alias support
       KVM: Remove kernel-allocated memory regions
       KVM: i8259: reduce excessive abstraction for pic_irq_request()
       KVM: i8259: simplify pic_irq_request() calling sequence
       KVM: Add mini-API for vcpu->requests
       KVM: Reduce atomic operations on vcpu->requests
       KVM: Keep slot ID in memory slot structure
       KVM: Prevent internal slots from being COWed
       KVM: Simplify vcpu_enter_guest() mmu reload logic slightly
       KVM: Document KVM specific review items
       KVM: MMU: Introduce drop_spte()
       KVM: MMU: Move accessed/dirty bit checks from rmap_remove() to 
drop_spte()
       KVM: MMU: Atomically check for accessed bit when dropping an spte
       KVM: MMU: Don't drop accessed bit while updating an spte
       KVM: MMU: Only indicate a fetch fault in page fault error code if 
nx is enabled
       KVM: MMU: Keep going on permission error
       KVM: Expose MCE control MSRs to userspace
       KVM: Document MCE banks non-exposure via KVM_GET_MSR_INDEX_LIST
       KVM: MMU: Add link_shadow_page() helper
       KVM: MMU: Use __set_spte to link shadow pages
       KVM: MMU: Add drop_large_spte() helper
       KVM: MMU: Add validate_direct_spte() helper
       KVM: MMU: Add gpte_valid() helper
       KVM: MMU: Simplify spte fetch() function
       KVM: MMU: Validate all gptes during fetch, not just those used 
for new pages
       KVM: MMU: Eliminate redundant temporaries in FNAME(fetch)
       KVM: Document KVM_GET_SUPPORTED_CPUID2 ioctl
       KVM: VMX: Fix host GDT.LIMIT corruption

Chris Lalancette (4):
       KVM: x86: Introduce a workqueue to deliver PIT timer interrupts
       KVM: x86: Allow any LAPIC to accept PIC interrupts
       KVM: x86: In DM_LOWEST, only deliver interrupts to vcpus with 
enabled LAPIC's
       KVM: Search the LAPIC's for one that will accept a PIC interrupt

Christian Borntraeger (2):
       KVM: s390: Fix build failure due to centralized vcpu locking patches
       KVM: s390: Don't exit SIE on SIGP sense running

Denis Kirjanov (1):
       KVM: PPC: fix build warning in kvm_arch_vcpu_ioctl_run

Dexuan Cui (1):
       KVM: VMX: Enable XSAVE/XRSTOR for guest

Dongxiao Xu (4):
       KVM: VMX: Define new functions to wrapper direct call of asm code
       KVM: VMX: Some minor changes to code structure
       KVM: VMX: VMCLEAR/VMPTRLD usage changes
       KVM: VMX: VMXON/VMXOFF usage changes

Glauber Costa (1):
       KVM: Add Documentation/kvm/msr.txt

Gleb Natapov (32):
       KVM: x86 emulator: introduce read cache
       KVM: x86 emulator: fix Move r/m16 to segment register decoding
       KVM: x86 emulator: cleanup xchg emulation
       KVM: x86 emulator: cleanup nop emulation
       KVM: x86 emulator: handle "far address" source operand
       KVM: x86 emulator: add (set|get)_dr callbacks to x86_emulate_ops
       KVM: x86 emulator: add (set|get)_msr callbacks to x86_emulate_ops
       KVM: x86 emulator: add get_cached_segment_base() callback to 
x86_emulate_ops
       KVM: x86 emulator: cleanup some direct calls into kvm to use 
existing callbacks
       KVM: x86 emulator: make set_cr() callback return error if it fails
       KVM: x86 emulator: make (get|set)_dr() callback return error if 
it fails
       KVM: x86 emulator: fix X86EMUL_RETRY_INSTR and 
X86EMUL_CMPXCHG_FAILED values
       KVM: fill in run->mmio details in (read|write)_emulated function
       KVM: x86 emulator: x86_emulate_insn() return -1 only in case of 
emulation failure
       KVM: remove export of emulator_write_emulated()
       KVM: do not inject #PF in (read|write)_emulated() callbacks
       KVM: handle emulation failure case first
       KVM: x86 emulator: advance RIP outside x86 emulator code
       KVM: x86 emulator: set RFLAGS outside x86 emulator code
       KVM: x86 emulator: use shadowed register in emulate_sysexit()
       KVM: x86 emulator: handle shadowed registers outside emulator
       KVM: x86 emulator: move interruptibility state tracking out of 
emulator
       KVM: x86 emulator: do not inject exception directly into vcpu
       KVM: inject #UD if instruction emulation fails and exit to userspace
       KVM: SVM: correctly trace irq injection
       KVM: define hwpoison variables static
       KVM: Return EFAULT from kvm ioctl when guest accesses bad area
       KVM: Reenter guest after emulation failure if due to access to 
non-mmio address
       KVM: Convert mask notifiers to use irqchip/pin instead of gsi
       KVM: x86: emulator: inc/dec can have lock prefix
       KVM: x86: never re-execute instruction with enabled tdp
       KVM: x86: Call mask notifiers from pic

Gui Jianfeng (9):
       KVM: MMU: mark page table dirty when a pte is actually modified
       KVM: MMU: Fix debug output error in walk_addr()
       KVM: MMU: make kvm_mmu_zap_page() return the number of pages it 
actually freed
       KVM: update mmu documetation for role.nxe
       KVM: MMU: don't check PT_WRITABLE_MASK directly
       KVM: MMU: Don't calculate quadrant if tdp_enabled
       KVM: VMX: Make sure single type invvpid is supported before 
issuing invvpid instruction
       KVM: VMX: Add all-context INVVPID type support
       KVM: VMX: rename vpid_sync_vcpu_all() to vpid_sync_vcpu_single()

Huang Ying (2):
       KVM: Avoid killing userspace through guest SRAO MCE on unmapped pages
       KVM: Fix a race condition for usage of is_hwpoison_address()

Jan Kiszka (1):
       KVM: x86: Propagate fpu_alloc errors

Jason Wang (1):
       KVM: Fix typos in Documentation/kvm/mmu.txt

Jiri Slaby (1):
       KVM: fix lock imbalance in kvm_create_pit()

Joerg Roedel (4):
       KVM: SVM: Dump vmcb contents on failed vmrun
       KVM: SVM: Allow EFER.LMSLE to be set with nested svm
       KVM: Remove unnecessary divide operations
       KVM: Use u64 for frame data types

Lai Jiangshan (5):
       KVM: MMU: Don't allocate gfns page for direct mmu pages
       KVM: MMU: Calculate correct base gfn for direct non-DIR level
       KVM: MMU: calculate correct gfn for small host pages backing 
large guest pages
       KVM: cleanup "*new.rmap" type
       KVM: x86: use linux/uaccess.h instead of asm/uaccess.h

Marcelo Tosatti (1):
       KVM: pass correct parameter to kvm_mmu_free_some_pages

Mohammed Gamal (5):
       KVM: x86 emulator: Add test acc, imm instruction (opcodes 0xA8 - 
0xA9)
       KVM: x86 emulator: Add missing decoder flags for sub instruction
       KVM: x86 emulator: Add missing decoder flags for xor instructions
       KVM: VMX: Add constant for invalid guest state exit reason
       KVM: VMX: Properly return error to userspace on vmentry failure

Sheng Yang (10):
       KVM: x86: Clean up duplicate assignment
       KVM: VMX: Only reset MMU when necessary
       x86: Export FPU API for KVM use
       KVM: x86: Use unlazy_fpu() for host FPU
       KVM: x86: Use FPU API
       KVM: VMX: Enforce EPT pagetable level checking
       KVM: x86: XSAVE/XRSTOR live migration support
       KVM: x86: Enable AVX for guest
       KVM: VMX: Execute WBINVD to keep data consistency with assigned 
devices
       KVM: Fix IOMMU memslot reference warning

Takuya Yoshikawa (3):
       KVM: x86: avoid unnecessary bitmap allocation when memslot is clean
       KVM: ia64: fix dirty_log_lock spin_lock section not to include 
get_dirty_log()
       KVM: ia64: cleanup kvm_ia64_sync_dirty_log()

Wei Yongjun (9):
       KVM: x86 emulator: fix pusha instruction emulation
       KVM: x86 emulator: fix group3 instruction decoding
       KVM: x86 emulator: fix 'mov sreg,rm16' instruction decoding
       KVM: x86 emulator: fix the comment of out instruction
       KVM: x86 emulator: fix 'and AL,imm8' instruction decoding
       KVM: x86 emulator: fix 'mov rm,sreg' instruction decoding
       KVM: x86 emulator: fix cli/sti instruction emulation
       KVM: x86 emulator: re-implementing 'mov AL,moffs' instruction 
decoding
       KVM: x86 emulator: fix xchg instruction emulation

Xiao Guangrong (39):
       KVM: MMU: use proper cache object freeing function
       KVM: MMU: remove rmap before clear spte
       KVM: MMU: unalias gfn before sp->gfns[] comparison in sync_page
       KVM: x86: cleanup unused local variable
       KVM: MMU: split kvm_sync_page() function
       KVM: MMU: don't write-protect if have new mapping to unsync page
       KVM: MMU: only update unsync page in invlpg path
       KVM: MMU: allow more page become unsync at gfn mapping time
       KVM: MMU: allow more page become unsync at getting sp time
       KVM: MMU: skip invalid sp when unprotect page
       KVM: MMU: introduce some macros to cleanup hlist traverseing
       KVM: MMU: split the operations of kvm_mmu_zap_page()
       KVM: MMU: don't get free page number in the loop
       KVM: MMU: gather remote tlb flush which occurs during page zapped
       KVM: MMU: traverse sp hlish safely
       KVM: MMU: reduce remote tlb flush in kvm_mmu_pte_write()
       KVM: VMX: fix rcu usage warning in init_rmode()
       KVM: MMU: remove unnecessary remote tlb flush
       KVM: MMU: use wrapper function to flush local tlb
       KVM: MMU: delay local tlb flush
       KVM: MMU: rename 'page' and 'shadow_page' to 'sp'
       KVM: MMU: cleanup for dirty page judgment
       KVM: MMU: avoid double write protected in sync page path
       KVM: MMU: don't mark pte notrap if it's just sync transient
       KVM: MMU: cleanup for __mmu_unsync_walk()
       KVM: MMU: clear unsync_child_bitmap completely
       KVM: MMU: don't walk every parent pages while mark unsync
       KVM: MMU: fix writable sync sp mapping
       KVM: MMU: fix conflict access permissions in direct sp
       KVM: MMU: fix direct sp's access corrupted
       KVM: MMU: cleanup FNAME(fetch)() functions
       KVM: VMX: fix tlb flush with invalid root
       KVM: PIT: stop vpit before freeing irq_routing
       KVM: MMU: add missing reserved bits check in speculative path
       KVM: MMU: fix broken page accessed tracking with ept enabled
       KVM: MMU: fix page dirty tracking lost while sync page
       KVM: MMU: don't atomicly set spte if it's not present
       KVM: MMU: cleanup spte set and accssed/dirty tracking
       KVM: MMU: using __xchg_spte more smarter

Zachary Amsden (2):
       KVM: SVM: Fix EFER.LME being stripped
       KVM: x86: fix -DDEBUG oops

  Documentation/feature-removal-schedule.txt |   21 -
  Documentation/kvm/api.txt                  |  208 ++++-
  Documentation/kvm/mmu.txt                  |   52 ++-
  Documentation/kvm/msr.txt                  |  153 ++++
  Documentation/kvm/review-checklist.txt     |   38 +
  arch/ia64/include/asm/kvm_host.h           |    1 +
  arch/ia64/kvm/kvm-ia64.c                   |   50 +-
  arch/powerpc/include/asm/kvm_book3s.h      |   10 +-
  arch/powerpc/include/asm/kvm_fpu.h         |   27 +-
  arch/powerpc/include/asm/kvm_host.h        |   18 +-
  arch/powerpc/kernel/ppc_ksyms.c            |    4 -
  arch/powerpc/kvm/44x_tlb.c                 |    3 +-
  arch/powerpc/kvm/Makefile                  |    2 +
  arch/powerpc/kvm/book3s.c                  |   79 +-
  arch/powerpc/kvm/book3s_32_mmu.c           |    8 +-
  arch/powerpc/kvm/book3s_32_mmu_host.c      |  134 +---
  arch/powerpc/kvm/book3s_64_mmu_host.c      |  129 +---
  arch/powerpc/kvm/book3s_mmu_hpte.c         |  277 +++++++
  arch/powerpc/kvm/book3s_paired_singles.c   |   94 +--
  arch/powerpc/kvm/booke.c                   |   12 +-
  arch/powerpc/kvm/fpu.S                     |   18 +
  arch/powerpc/kvm/powerpc.c                 |   14 +-
  arch/s390/include/asm/kvm_host.h           |    5 +-
  arch/s390/kvm/intercept.c                  |    2 +-
  arch/s390/kvm/kvm-s390.c                   |   64 +--
  arch/s390/kvm/kvm-s390.h                   |    2 +-
  arch/x86/include/asm/i387.h                |    2 +
  arch/x86/include/asm/kvm.h                 |   22 +
  arch/x86/include/asm/kvm_emulate.h         |   30 +-
  arch/x86/include/asm/kvm_host.h            |   70 +--
  arch/x86/include/asm/msr-index.h           |    2 +
  arch/x86/include/asm/vmx.h                 |    5 +
  arch/x86/include/asm/xsave.h               |    6 +
  arch/x86/kernel/i387.c                     |    3 +-
  arch/x86/kernel/process.c                  |    1 +
  arch/x86/kvm/emulate.c                     |  749 ++++++++++--------
  arch/x86/kvm/i8254.c                       |  146 +++--
  arch/x86/kvm/i8254.h                       |    4 +-
  arch/x86/kvm/i8259.c                       |   48 +-
  arch/x86/kvm/irq.c                         |    2 +-
  arch/x86/kvm/irq.h                         |    4 -
  arch/x86/kvm/kvm_cache_regs.h              |    8 +
  arch/x86/kvm/lapic.c                       |   17 +-
  arch/x86/kvm/mmu.c                         |  807 ++++++++++++--------
  arch/x86/kvm/mmutrace.h                    |    2 +-
  arch/x86/kvm/paging_tmpl.h                 |  252 ++++---
  arch/x86/kvm/svm.c                         |  138 +++-
  arch/x86/kvm/timer.c                       |   16 +-
  arch/x86/kvm/vmx.c                         |  253 +++++--
  arch/x86/kvm/x86.c                         | 1174 
+++++++++++++++-------------
  arch/x86/kvm/x86.h                         |    7 -
  include/linux/kvm.h                        |   13 +
  include/linux/kvm_host.h                   |   35 +-
  include/linux/kvm_types.h                  |    4 +-
  include/linux/mm.h                         |    8 +
  mm/memory-failure.c                        |   33 +
  virt/kvm/assigned-dev.c                    |    7 +-
  virt/kvm/coalesced_mmio.c                  |    1 +
  virt/kvm/eventfd.c                         |    1 +
  virt/kvm/ioapic.c                          |    3 +-
  virt/kvm/iommu.c                           |   12 +-
  virt/kvm/irq_comm.c                        |   15 +-
  virt/kvm/kvm_main.c                        |  106 ++-
  63 files changed, 3328 insertions(+), 2103 deletions(-)
  create mode 100644 Documentation/kvm/msr.txt
  create mode 100644 Documentation/kvm/review-checklist.txt
  create mode 100644 arch/powerpc/kvm/book3s_mmu_hpte.c

-- 
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ