qemu-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Qemu-commits] [qemu/qemu] 278f06: Update Linux headers to 5.13-rc4


From: Peter Maydell
Subject: [Qemu-commits] [qemu/qemu] 278f06: Update Linux headers to 5.13-rc4
Date: Mon, 21 Jun 2021 08:11:48 -0700

  Branch: refs/heads/master
  Home:   https://github.com/qemu/qemu
  Commit: 278f064e452468d66ee15c3f453826e697ec6832
      
https://github.com/qemu/qemu/commit/278f064e452468d66ee15c3f453826e697ec6832
  Author: Eduardo Habkost <ehabkost@redhat.com>
  Date:   2021-06-17 (Thu, 17 Jun 2021)

  Changed paths:
    M include/standard-headers/drivers/infiniband/hw/vmw_pvrdma/pvrdma_verbs.h
    M include/standard-headers/drm/drm_fourcc.h
    M include/standard-headers/linux/ethtool.h
    M include/standard-headers/linux/fuse.h
    M include/standard-headers/linux/input.h
    A include/standard-headers/linux/virtio_bt.h
    M include/standard-headers/linux/virtio_ids.h
    A include/standard-headers/linux/virtio_snd.h
    M include/standard-headers/rdma/vmw_pvrdma-abi.h
    M linux-headers/asm-generic/unistd.h
    M linux-headers/asm-mips/unistd_n32.h
    M linux-headers/asm-mips/unistd_n64.h
    M linux-headers/asm-mips/unistd_o32.h
    M linux-headers/asm-powerpc/kvm.h
    M linux-headers/asm-powerpc/unistd_32.h
    M linux-headers/asm-powerpc/unistd_64.h
    M linux-headers/asm-s390/unistd_32.h
    M linux-headers/asm-s390/unistd_64.h
    M linux-headers/asm-x86/kvm.h
    M linux-headers/asm-x86/unistd_32.h
    M linux-headers/asm-x86/unistd_64.h
    M linux-headers/asm-x86/unistd_x32.h
    M linux-headers/linux/kvm.h
    M linux-headers/linux/userfaultfd.h
    M linux-headers/linux/vfio.h

  Log Message:
  -----------
  Update Linux headers to 5.13-rc4

Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Message-Id: <20210603191541.2862286-1-ehabkost@redhat.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>


  Commit: 035d1ef26565f8f8eae058c37f5731a9ae304b96
      
https://github.com/qemu/qemu/commit/035d1ef26565f8f8eae058c37f5731a9ae304b96
  Author: Chenyi Qiang <chenyi.qiang@intel.com>
  Date:   2021-06-17 (Thu, 17 Jun 2021)

  Changed paths:
    M hw/i386/x86.c
    M include/hw/i386/x86.h
    M target/i386/kvm/kvm.c

  Log Message:
  -----------
  i386: Add ratelimit for bus locks acquired in guest

A bus lock is acquired through either split locked access to writeback
(WB) memory or any locked access to non-WB memory. It is typically >1000
cycles slower than an atomic operation within a cache and can also
disrupts performance on other cores.

Virtual Machines can exploit bus locks to degrade the performance of
system. To address this kind of performance DOS attack coming from the
VMs, bus lock VM exit is introduced in KVM and it can report the bus
locks detected in guest. If enabled in KVM, it would exit to the
userspace to let the user enforce throttling policies once bus locks
acquired in VMs.

The availability of bus lock VM exit can be detected through the
KVM_CAP_X86_BUS_LOCK_EXIT. The returned bitmap contains the potential
policies supported by KVM. The field KVM_BUS_LOCK_DETECTION_EXIT in
bitmap is the only supported strategy at present. It indicates that KVM
will exit to userspace to handle the bus locks.

This patch adds a ratelimit on the bus locks acquired in guest as a
mitigation policy.

Introduce a new field "bus_lock_ratelimit" to record the limited speed
of bus locks in the target VM. The user can specify it through the
"bus-lock-ratelimit" as a machine property. In current implementation,
the default value of the speed is 0 per second, which means no
restrictions on the bus locks.

As for ratelimit on detected bus locks, simply set the ratelimit
interval to 1s and restrict the quota of bus lock occurence to the value
of "bus_lock_ratelimit". A potential alternative is to introduce the
time slice as a property which can help the user achieve more precise
control.

The detail of bus lock VM exit can be found in spec:
https://software.intel.com/content/www/us/en/develop/download/intel-architecture-instruction-set-extensions-programming-reference.html

Signed-off-by: Chenyi Qiang <chenyi.qiang@intel.com>
Message-Id: <20210521043820.29678-1-chenyi.qiang@intel.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>


  Commit: f538adeccf4554e6402fe661a0a51bcc8d6bd227
      
https://github.com/qemu/qemu/commit/f538adeccf4554e6402fe661a0a51bcc8d6bd227
  Author: Tom Lendacky <thomas.lendacky@amd.com>
  Date:   2021-06-17 (Thu, 17 Jun 2021)

  Changed paths:
    M docs/amd-memory-encryption.txt

  Log Message:
  -----------
  doc: Fix some mistakes in the SEV documentation

Fix some spelling and grammar mistakes in the amd-memory-encryption.txt
file. No new information added.

Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Connor Kuehl <ckuehl@redhat.com>
Message-Id: 
<a7c5ee6c056d840f46028f4a817c16a9862bdd9e.1619208498.git.thomas.lendacky@amd.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>


  Commit: 61b7d7098cd53dd386939610d534f8bd79240881
      
https://github.com/qemu/qemu/commit/61b7d7098cd53dd386939610d534f8bd79240881
  Author: Tom Lendacky <thomas.lendacky@amd.com>
  Date:   2021-06-17 (Thu, 17 Jun 2021)

  Changed paths:
    M docs/amd-memory-encryption.txt

  Log Message:
  -----------
  docs: Add SEV-ES documentation to amd-memory-encryption.txt

Update the amd-memory-encryption.txt file with information about SEV-ES,
including how to launch an SEV-ES guest and some of the differences
between SEV and SEV-ES guests in regards to launching and measuring the
guest.

Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Acked-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Connor Kuehl <ckuehl@redhat.com>
Message-Id: 
<fa1825a5eb0290eac4712cde75ba4c6829946eac.1619208498.git.thomas.lendacky@amd.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>


  Commit: d44df1d73ce04d7f4b8f94cba5f715e2dadc998b
      
https://github.com/qemu/qemu/commit/d44df1d73ce04d7f4b8f94cba5f715e2dadc998b
  Author: Tom Lendacky <thomas.lendacky@amd.com>
  Date:   2021-06-17 (Thu, 17 Jun 2021)

  Changed paths:
    M docs/interop/firmware.json

  Log Message:
  -----------
  docs/interop/firmware.json: Add SEV-ES support

Create an enum definition, '@amd-sev-es', for SEV-ES and add documention
for the new enum. Add an example that shows some of the requirements for
SEV-ES, including not having SMM support and the requirement for an
X64-only build.

Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Connor Kuehl <ckuehl@redhat.com>
Message-Id: 
<b941a7ee105dfeb67607cf2d24dafcb82658b212.1619208498.git.thomas.lendacky@amd.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>


  Commit: 38dec0ef76a852d10636a69fc93b21cee9a67715
      
https://github.com/qemu/qemu/commit/38dec0ef76a852d10636a69fc93b21cee9a67715
  Author: Daniel P. Berrangé <berrange@redhat.com>
  Date:   2021-06-17 (Thu, 17 Jun 2021)

  Changed paths:
    M MAINTAINERS
    A docs/system/cpu-models-x86-abi.csv
    M docs/system/cpu-models-x86.rst.inc

  Log Message:
  -----------
  docs: add a table showing x86-64 ABI compatibility levels

It is useful to know which CPUs satisfy each x86-64 ABI
compatibility level, when dealing with guest OS that require
something newer than the baseline ABI.

These ABI levels are defined in:

  https://gitlab.com/x86-psABIs/x86-64-ABI/

and supported by GCC, Clang, glibc and more.

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Message-Id: <20210607135843.196595-2-berrange@redhat.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>


  Commit: 4e2f5f3a9db06e87a73eb60a7cc9754fc13596ee
      
https://github.com/qemu/qemu/commit/4e2f5f3a9db06e87a73eb60a7cc9754fc13596ee
  Author: Daniel P. Berrangé <berrange@redhat.com>
  Date:   2021-06-17 (Thu, 17 Jun 2021)

  Changed paths:
    A scripts/cpu-x86-uarch-abi.py

  Log Message:
  -----------
  scripts: helper to generate x86_64 CPU ABI compat info

This script is what is used to generate the docs data table in:

  docs/system/cpu-models-x86-abi.csv

It can be useful to run if adding new CPU models / versions and
the csv needs updating.

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Acked-by: Eduardo Habkost <ehabkost@redhat.com>
Message-Id: <20210607135843.196595-4-berrange@redhat.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>


  Commit: 53f306f316549d20c76886903181413d20842423
      
https://github.com/qemu/qemu/commit/53f306f316549d20c76886903181413d20842423
  Author: Peter Maydell <peter.maydell@linaro.org>
  Date:   2021-06-21 (Mon, 21 Jun 2021)

  Changed paths:
    M MAINTAINERS
    M docs/amd-memory-encryption.txt
    M docs/interop/firmware.json
    A docs/system/cpu-models-x86-abi.csv
    M docs/system/cpu-models-x86.rst.inc
    M hw/i386/x86.c
    M include/hw/i386/x86.h
    M include/standard-headers/drivers/infiniband/hw/vmw_pvrdma/pvrdma_verbs.h
    M include/standard-headers/drm/drm_fourcc.h
    M include/standard-headers/linux/ethtool.h
    M include/standard-headers/linux/fuse.h
    M include/standard-headers/linux/input.h
    A include/standard-headers/linux/virtio_bt.h
    M include/standard-headers/linux/virtio_ids.h
    A include/standard-headers/linux/virtio_snd.h
    M include/standard-headers/rdma/vmw_pvrdma-abi.h
    M linux-headers/asm-generic/unistd.h
    M linux-headers/asm-mips/unistd_n32.h
    M linux-headers/asm-mips/unistd_n64.h
    M linux-headers/asm-mips/unistd_o32.h
    M linux-headers/asm-powerpc/kvm.h
    M linux-headers/asm-powerpc/unistd_32.h
    M linux-headers/asm-powerpc/unistd_64.h
    M linux-headers/asm-s390/unistd_32.h
    M linux-headers/asm-s390/unistd_64.h
    M linux-headers/asm-x86/kvm.h
    M linux-headers/asm-x86/unistd_32.h
    M linux-headers/asm-x86/unistd_64.h
    M linux-headers/asm-x86/unistd_x32.h
    M linux-headers/linux/kvm.h
    M linux-headers/linux/userfaultfd.h
    M linux-headers/linux/vfio.h
    A scripts/cpu-x86-uarch-abi.py
    M target/i386/kvm/kvm.c

  Log Message:
  -----------
  Merge remote-tracking branch 'remotes/ehabkost-gl/tags/x86-next-pull-request' 
into staging

x86 queue, 2021-06-18

Features:
* Add ratelimit for bus locks acquired in guest (Chenyi Qiang)

Documentation:
* SEV documentation updates (Tom Lendacky)
* Add a table showing x86-64 ABI compatibility levels (Daniel P. Berrangé)

Automated changes:
* Update Linux headers to 5.13-rc4 (Eduardo Habkost)

# gpg: Signature made Fri 18 Jun 2021 20:51:26 BST
# gpg:                using RSA key 5A322FD5ABC4D3DBACCFD1AA2807936F984DC5A6
# gpg:                issuer "ehabkost@redhat.com"
# gpg: Good signature from "Eduardo Habkost <ehabkost@redhat.com>" [full]
# Primary key fingerprint: 5A32 2FD5 ABC4 D3DB ACCF  D1AA 2807 936F 984D C5A6

* remotes/ehabkost-gl/tags/x86-next-pull-request:
  scripts: helper to generate x86_64 CPU ABI compat info
  docs: add a table showing x86-64 ABI compatibility levels
  docs/interop/firmware.json: Add SEV-ES support
  docs: Add SEV-ES documentation to amd-memory-encryption.txt
  doc: Fix some mistakes in the SEV documentation
  i386: Add ratelimit for bus locks acquired in guest
  Update Linux headers to 5.13-rc4

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>


Compare: https://github.com/qemu/qemu/compare/e4bfa6cd68e0...53f306f31654



reply via email to

[Prev in Thread] Current Thread [Next in Thread]