[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-commits] [qemu/qemu] 278f06: Update Linux headers to 5.13-rc4
From: |
Peter Maydell |
Subject: |
[Qemu-commits] [qemu/qemu] 278f06: Update Linux headers to 5.13-rc4 |
Date: |
Mon, 21 Jun 2021 08:11:48 -0700 |
Branch: refs/heads/master
Home: https://github.com/qemu/qemu
Commit: 278f064e452468d66ee15c3f453826e697ec6832
https://github.com/qemu/qemu/commit/278f064e452468d66ee15c3f453826e697ec6832
Author: Eduardo Habkost <ehabkost@redhat.com>
Date: 2021-06-17 (Thu, 17 Jun 2021)
Changed paths:
M include/standard-headers/drivers/infiniband/hw/vmw_pvrdma/pvrdma_verbs.h
M include/standard-headers/drm/drm_fourcc.h
M include/standard-headers/linux/ethtool.h
M include/standard-headers/linux/fuse.h
M include/standard-headers/linux/input.h
A include/standard-headers/linux/virtio_bt.h
M include/standard-headers/linux/virtio_ids.h
A include/standard-headers/linux/virtio_snd.h
M include/standard-headers/rdma/vmw_pvrdma-abi.h
M linux-headers/asm-generic/unistd.h
M linux-headers/asm-mips/unistd_n32.h
M linux-headers/asm-mips/unistd_n64.h
M linux-headers/asm-mips/unistd_o32.h
M linux-headers/asm-powerpc/kvm.h
M linux-headers/asm-powerpc/unistd_32.h
M linux-headers/asm-powerpc/unistd_64.h
M linux-headers/asm-s390/unistd_32.h
M linux-headers/asm-s390/unistd_64.h
M linux-headers/asm-x86/kvm.h
M linux-headers/asm-x86/unistd_32.h
M linux-headers/asm-x86/unistd_64.h
M linux-headers/asm-x86/unistd_x32.h
M linux-headers/linux/kvm.h
M linux-headers/linux/userfaultfd.h
M linux-headers/linux/vfio.h
Log Message:
-----------
Update Linux headers to 5.13-rc4
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Message-Id: <20210603191541.2862286-1-ehabkost@redhat.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Commit: 035d1ef26565f8f8eae058c37f5731a9ae304b96
https://github.com/qemu/qemu/commit/035d1ef26565f8f8eae058c37f5731a9ae304b96
Author: Chenyi Qiang <chenyi.qiang@intel.com>
Date: 2021-06-17 (Thu, 17 Jun 2021)
Changed paths:
M hw/i386/x86.c
M include/hw/i386/x86.h
M target/i386/kvm/kvm.c
Log Message:
-----------
i386: Add ratelimit for bus locks acquired in guest
A bus lock is acquired through either split locked access to writeback
(WB) memory or any locked access to non-WB memory. It is typically >1000
cycles slower than an atomic operation within a cache and can also
disrupts performance on other cores.
Virtual Machines can exploit bus locks to degrade the performance of
system. To address this kind of performance DOS attack coming from the
VMs, bus lock VM exit is introduced in KVM and it can report the bus
locks detected in guest. If enabled in KVM, it would exit to the
userspace to let the user enforce throttling policies once bus locks
acquired in VMs.
The availability of bus lock VM exit can be detected through the
KVM_CAP_X86_BUS_LOCK_EXIT. The returned bitmap contains the potential
policies supported by KVM. The field KVM_BUS_LOCK_DETECTION_EXIT in
bitmap is the only supported strategy at present. It indicates that KVM
will exit to userspace to handle the bus locks.
This patch adds a ratelimit on the bus locks acquired in guest as a
mitigation policy.
Introduce a new field "bus_lock_ratelimit" to record the limited speed
of bus locks in the target VM. The user can specify it through the
"bus-lock-ratelimit" as a machine property. In current implementation,
the default value of the speed is 0 per second, which means no
restrictions on the bus locks.
As for ratelimit on detected bus locks, simply set the ratelimit
interval to 1s and restrict the quota of bus lock occurence to the value
of "bus_lock_ratelimit". A potential alternative is to introduce the
time slice as a property which can help the user achieve more precise
control.
The detail of bus lock VM exit can be found in spec:
https://software.intel.com/content/www/us/en/develop/download/intel-architecture-instruction-set-extensions-programming-reference.html
Signed-off-by: Chenyi Qiang <chenyi.qiang@intel.com>
Message-Id: <20210521043820.29678-1-chenyi.qiang@intel.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Commit: f538adeccf4554e6402fe661a0a51bcc8d6bd227
https://github.com/qemu/qemu/commit/f538adeccf4554e6402fe661a0a51bcc8d6bd227
Author: Tom Lendacky <thomas.lendacky@amd.com>
Date: 2021-06-17 (Thu, 17 Jun 2021)
Changed paths:
M docs/amd-memory-encryption.txt
Log Message:
-----------
doc: Fix some mistakes in the SEV documentation
Fix some spelling and grammar mistakes in the amd-memory-encryption.txt
file. No new information added.
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Connor Kuehl <ckuehl@redhat.com>
Message-Id:
<a7c5ee6c056d840f46028f4a817c16a9862bdd9e.1619208498.git.thomas.lendacky@amd.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Commit: 61b7d7098cd53dd386939610d534f8bd79240881
https://github.com/qemu/qemu/commit/61b7d7098cd53dd386939610d534f8bd79240881
Author: Tom Lendacky <thomas.lendacky@amd.com>
Date: 2021-06-17 (Thu, 17 Jun 2021)
Changed paths:
M docs/amd-memory-encryption.txt
Log Message:
-----------
docs: Add SEV-ES documentation to amd-memory-encryption.txt
Update the amd-memory-encryption.txt file with information about SEV-ES,
including how to launch an SEV-ES guest and some of the differences
between SEV and SEV-ES guests in regards to launching and measuring the
guest.
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Acked-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Connor Kuehl <ckuehl@redhat.com>
Message-Id:
<fa1825a5eb0290eac4712cde75ba4c6829946eac.1619208498.git.thomas.lendacky@amd.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Commit: d44df1d73ce04d7f4b8f94cba5f715e2dadc998b
https://github.com/qemu/qemu/commit/d44df1d73ce04d7f4b8f94cba5f715e2dadc998b
Author: Tom Lendacky <thomas.lendacky@amd.com>
Date: 2021-06-17 (Thu, 17 Jun 2021)
Changed paths:
M docs/interop/firmware.json
Log Message:
-----------
docs/interop/firmware.json: Add SEV-ES support
Create an enum definition, '@amd-sev-es', for SEV-ES and add documention
for the new enum. Add an example that shows some of the requirements for
SEV-ES, including not having SMM support and the requirement for an
X64-only build.
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Connor Kuehl <ckuehl@redhat.com>
Message-Id:
<b941a7ee105dfeb67607cf2d24dafcb82658b212.1619208498.git.thomas.lendacky@amd.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Commit: 38dec0ef76a852d10636a69fc93b21cee9a67715
https://github.com/qemu/qemu/commit/38dec0ef76a852d10636a69fc93b21cee9a67715
Author: Daniel P. Berrangé <berrange@redhat.com>
Date: 2021-06-17 (Thu, 17 Jun 2021)
Changed paths:
M MAINTAINERS
A docs/system/cpu-models-x86-abi.csv
M docs/system/cpu-models-x86.rst.inc
Log Message:
-----------
docs: add a table showing x86-64 ABI compatibility levels
It is useful to know which CPUs satisfy each x86-64 ABI
compatibility level, when dealing with guest OS that require
something newer than the baseline ABI.
These ABI levels are defined in:
https://gitlab.com/x86-psABIs/x86-64-ABI/
and supported by GCC, Clang, glibc and more.
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Message-Id: <20210607135843.196595-2-berrange@redhat.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Commit: 4e2f5f3a9db06e87a73eb60a7cc9754fc13596ee
https://github.com/qemu/qemu/commit/4e2f5f3a9db06e87a73eb60a7cc9754fc13596ee
Author: Daniel P. Berrangé <berrange@redhat.com>
Date: 2021-06-17 (Thu, 17 Jun 2021)
Changed paths:
A scripts/cpu-x86-uarch-abi.py
Log Message:
-----------
scripts: helper to generate x86_64 CPU ABI compat info
This script is what is used to generate the docs data table in:
docs/system/cpu-models-x86-abi.csv
It can be useful to run if adding new CPU models / versions and
the csv needs updating.
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Acked-by: Eduardo Habkost <ehabkost@redhat.com>
Message-Id: <20210607135843.196595-4-berrange@redhat.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Commit: 53f306f316549d20c76886903181413d20842423
https://github.com/qemu/qemu/commit/53f306f316549d20c76886903181413d20842423
Author: Peter Maydell <peter.maydell@linaro.org>
Date: 2021-06-21 (Mon, 21 Jun 2021)
Changed paths:
M MAINTAINERS
M docs/amd-memory-encryption.txt
M docs/interop/firmware.json
A docs/system/cpu-models-x86-abi.csv
M docs/system/cpu-models-x86.rst.inc
M hw/i386/x86.c
M include/hw/i386/x86.h
M include/standard-headers/drivers/infiniband/hw/vmw_pvrdma/pvrdma_verbs.h
M include/standard-headers/drm/drm_fourcc.h
M include/standard-headers/linux/ethtool.h
M include/standard-headers/linux/fuse.h
M include/standard-headers/linux/input.h
A include/standard-headers/linux/virtio_bt.h
M include/standard-headers/linux/virtio_ids.h
A include/standard-headers/linux/virtio_snd.h
M include/standard-headers/rdma/vmw_pvrdma-abi.h
M linux-headers/asm-generic/unistd.h
M linux-headers/asm-mips/unistd_n32.h
M linux-headers/asm-mips/unistd_n64.h
M linux-headers/asm-mips/unistd_o32.h
M linux-headers/asm-powerpc/kvm.h
M linux-headers/asm-powerpc/unistd_32.h
M linux-headers/asm-powerpc/unistd_64.h
M linux-headers/asm-s390/unistd_32.h
M linux-headers/asm-s390/unistd_64.h
M linux-headers/asm-x86/kvm.h
M linux-headers/asm-x86/unistd_32.h
M linux-headers/asm-x86/unistd_64.h
M linux-headers/asm-x86/unistd_x32.h
M linux-headers/linux/kvm.h
M linux-headers/linux/userfaultfd.h
M linux-headers/linux/vfio.h
A scripts/cpu-x86-uarch-abi.py
M target/i386/kvm/kvm.c
Log Message:
-----------
Merge remote-tracking branch 'remotes/ehabkost-gl/tags/x86-next-pull-request'
into staging
x86 queue, 2021-06-18
Features:
* Add ratelimit for bus locks acquired in guest (Chenyi Qiang)
Documentation:
* SEV documentation updates (Tom Lendacky)
* Add a table showing x86-64 ABI compatibility levels (Daniel P. Berrangé)
Automated changes:
* Update Linux headers to 5.13-rc4 (Eduardo Habkost)
# gpg: Signature made Fri 18 Jun 2021 20:51:26 BST
# gpg: using RSA key 5A322FD5ABC4D3DBACCFD1AA2807936F984DC5A6
# gpg: issuer "ehabkost@redhat.com"
# gpg: Good signature from "Eduardo Habkost <ehabkost@redhat.com>" [full]
# Primary key fingerprint: 5A32 2FD5 ABC4 D3DB ACCF D1AA 2807 936F 984D C5A6
* remotes/ehabkost-gl/tags/x86-next-pull-request:
scripts: helper to generate x86_64 CPU ABI compat info
docs: add a table showing x86-64 ABI compatibility levels
docs/interop/firmware.json: Add SEV-ES support
docs: Add SEV-ES documentation to amd-memory-encryption.txt
doc: Fix some mistakes in the SEV documentation
i386: Add ratelimit for bus locks acquired in guest
Update Linux headers to 5.13-rc4
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Compare: https://github.com/qemu/qemu/compare/e4bfa6cd68e0...53f306f31654