On Mon, Aug 05, 2024 at 07:07:36PM +0200, Arvid Picciani wrote:
> thanks all, it must be my call args then i guess.
> 
> with f9851d2ffef5 ovmf has to be loaded with
> 
> -drive 
> if=pflash,format=raw,unit=0,file=/AMDSEV/usr/local/share/qemu/OVMF_CODE.fd
> -drive if=pflash,format=raw,unit=1,file=/AMDSEV/null.fd

This is actually the old way SNP expected the BIOS to be loaded. Upstream
QEMU expects one to use -bios.

It may be possible that if=pflash just happens to not immediately fail for
you, but that's no longer the supported method and you may be getting some
sort of unexpected behavior because of it.

> 
> while the amd fork only accepts it via -bios

The only difference I'm aware of with snp-latest branch is that it
allows you to continue to specify:

  -drive if=pflash,format=raw,unit=1,file=/AMDSEV/null.fd

for the OVMF VARS image if you built with split OVMF CODE/VARS images. But
with upstream QEMU only the single-image OVMF is supported (via -bios).

> 
> thats the only thing i changed from the AMD reference launch.sh.
> i get the dreaded "SNP_LAUNCH_UPDATE ret=-22 fw_error=0 '' with

Yah, I try to use -drive if=pflash to specify OVMF BIOS like you are
doing above with f9851d2ffef5, then I get the same error. It's not
the most graceful failure path, but I'd consider it expected since you
are providing a BIOS in the expected manner which could certainly cause
a failure during SNP_LAUNCH_UPDATE's attempts to measure/encrypt it.

So try switch to non-split OVMF image and using -bios to specify it and
it seems likely that would avoid the error.

-Mike

> upstream qemu, which in the past indicated a mismatch between host
> kernel and qemu api.
> 
> from strace, i'm assuming something with memory changed, since
> KVM_MEMORY_ENCRYPT_OP fails,
> but the  documentation for how memory backend works is missing in
> qemu/docs/system/i386/amd-memory-encryption.rst or its automatic now?
> 
> here's the full args and strace
> 
> /root/qemu/build/qemu-bundle/usr/bin/qemu-system-x86_64 \
> -enable-kvm -cpu EPYC-v4 -machine q35 -smp 4,maxcpus=255 -m
> 2048M,slots=5,maxmem=10240M -no-reboot -drive
> if=pflash,format=raw,unit=0,file=/AMDSEV/usr/local/share/qemu/OVMF_CODE.fd
> -drive 
> if=pflash,format=raw,unit=1,file=/AMDSEV/debian-12-genericcloud-amd64-20240717-1811.fd
> -netdev user,id=vmnic  -device
> virtio-net-pci,disable-legacy=on,iommu_platform=true,netdev=vmnic,romfile=
> -drive 
> file=/root/debian-12-genericcloud-amd64-20240717-1811.raw,if=none,id=disk0,format=raw
> -device virtio-scsi-pci,id=scsi0,disable-legacy=on,iommu_platform=true
> -device scsi-hd,drive=disk0 -machine memory-encryption=sev0,vmport=off
> -object memory-backend-memfd,id=ram1,size=2048M,share=true,prealloc=false
> -machine memory-backend=ram1 -object
> sev-snp-guest,id=sev0,policy=0xb0000,cbitpos=51,reduced-phys-bits=1
> -nographic -monitor pty -monitor unix:monitor,server,nowait  -device
> virtio-serial-pci
> 
> 
> 
> 
> root@localhost:~# sh q.sh 2>&1 | grep KVM
> [pid 53235] ioctl(12, KVM_GET_API_VERSION, 0) = 12
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MEMORY_ATTRIBUTES) = 8
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GUEST_MEMFD) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_USER_MEMORY2) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IMMEDIATE_EXIT) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_NR_MEMSLOTS) = 32764
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MULTI_ADDRESS_SPACE) = 2
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VM_TYPES) = 31
> [pid 53235] ioctl(12, KVM_CREATE_VM, 0x4 <unfinished ...>
> [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS) = 128
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MAX_VCPUS) = 4096
> [pid 53235] write(2, "Number of hotpluggable cpus requ"..., 95Number
> of hotpluggable cpus requested (255) exceeds the recommended cpus
> supported by KVM (128)) = 95
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_USER_MEMORY) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
> KVM_CAP_DESTROY_MEMORY_REGION_WORKS) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
> KVM_CAP_JOIN_MEMORY_REGIONS_WORKS) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_INTERNAL_ERROR_DATA) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IOEVENTFD) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IOEVENTFD_ANY_LENGTH) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_TSS_ADDR) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_EXT_CPUID) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MP_STATE) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SIGNAL_MSI) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_DEBUGREGS) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VCPU_EVENTS) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_ROBUST_SINGLESTEP) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_ADJUST_CLOCK) = 14
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_IDENTITY_MAP_ADDR) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_COALESCED_MMIO) = 2
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_COALESCED_PIO) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
> KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2) = 3
> [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd0370) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VCPU_EVENTS) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_NESTED_STATE) = 4224
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_INJECT_STATUS) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_READONLY_MEM) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQFD_RESAMPLE) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VM_ATTRIBUTES) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_GUEST_DEBUG) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_GUEST_DEBUG2) = 2031619
> [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bd0040) = 0
> [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bcff10) = 0
> [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bcffa0) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XCRS) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SREGS2) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV_VP_INDEX) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_EXCEPTION_PAYLOAD) = 1
> [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_TRIPLE_FAULT_EVENT) = 1
> [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
> [pid 53235] ioctl(12, KVM_GET_MSR_INDEX_LIST, 0x7ffdb6bd00f0) = -1
> E2BIG (Argument list too long)
> [pid 53235] ioctl(12, KVM_GET_MSR_INDEX_LIST, 0x55d227634b40) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_MSR_FEATURES) = 1
> [pid 53235] ioctl(12, KVM_GET_MSR_FEATURE_INDEX_LIST, 0x7ffdb6bd00f0)
> = -1 E2BIG (Argument list too long)
> [pid 53235] ioctl(12, KVM_GET_MSR_FEATURE_INDEX_LIST, 0x55d2273a3ef0) = 0
> [pid 53235] ioctl(13, KVM_SET_IDENTITY_MAP_ADDR, 0x7ffdb6bd00e0) = 0
> [pid 53235] ioctl(13, KVM_SET_TSS_ADDR, 0xfeffd000) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_SMM) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_NOTIFY_VMEXIT) = 0
> [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_X86_USER_SPACE_MSR) = 1
> [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
> [pid 53235] ioctl(13, KVM_X86_SET_MSR_FILTER, 0x7ffdb6bcff30) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQCHIP) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQFD) = 1
> [pid 53235] ioctl(13, KVM_CREATE_IRQCHIP, 0) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_SYNC_MMU) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_BINARY_STATS_FD) = 1
> [pid 53235] ioctl(13, KVM_CREATE_GUEST_MEMFD, 0x7ffdb6bd0080) = 16
> [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd0210) = 0
> [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725920) = -1
> E2BIG (Argument list too long)
> [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725960) = -1
> E2BIG (Argument list too long)
> [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725a40) = -1
> E2BIG (Argument list too long)
> [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725a40) = -1
> E2BIG (Argument list too long)
> [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725b90) = -1
> E2BIG (Argument list too long)
> [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725e20) = -1
> E2BIG (Argument list too long)
> [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, {nent=61, entries=[...]}) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> [pid 53239] ioctl(13, KVM_CREATE_VCPU, 0) = 17
> [pid 53239] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> [pid 53239] ioctl(17, KVM_GET_TSC_KHZ, 0) = 2000000
> [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> [pid 53239] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f856d5fa578) = 0
> [pid 53239] ioctl(17, KVM_X86_SETUP_MCE, 0x55d227724b38) = 0
> [pid 53239] ioctl(17, KVM_SET_CPUID2, {nent=29, entries=[...]}) = 0
> [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 2
> [pid 53239] ioctl(17, KVM_GET_STATS_FD, 0) = 18
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> [pid 53240] ioctl(13, KVM_CREATE_VCPU, 1) = 19
> [pid 53240] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> [pid 53240] ioctl(19, KVM_GET_TSC_KHZ, 0) = 2000000
> [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> [pid 53240] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f856cbfa578) = 0
> [pid 53240] ioctl(19, KVM_X86_SETUP_MCE, 0x55d227757e48) = 0
> [pid 53240] ioctl(19, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
> [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 2
> [pid 53240] ioctl(19, KVM_GET_STATS_FD, 0) = 20
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING <unfinished 
> ...>
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> [pid 53241] ioctl(13, KVM_CREATE_VCPU, 2) = 21
> [pid 53241] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> [pid 53241] ioctl(21, KVM_GET_TSC_KHZ, 0) = 2000000
> [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> [pid 53241] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f84e7bfa578) = 0
> [pid 53241] ioctl(21, KVM_X86_SETUP_MCE, 0x55d227761e18) = 0
> [pid 53241] ioctl(21, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
> [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 2
> [pid 53241] ioctl(21, KVM_GET_STATS_FD, 0) = 22
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> [pid 53242] ioctl(13, KVM_CREATE_VCPU, 3) = 23
> [pid 53242] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> [pid 53242] ioctl(23, KVM_GET_TSC_KHZ, 0) = 2000000
> [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> [pid 53242] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f84e71fa578) = 0
> [pid 53242] ioctl(23, KVM_X86_SETUP_MCE, 0x55d22776bd18) = 0
> [pid 53242] ioctl(23, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
> [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 2
> [pid 53242] ioctl(23, KVM_GET_STATS_FD, 0) = 24
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING <unfinished 
> ...>
> [pid 53235] ioctl(13, KVM_GET_CLOCK, 0x7ffdb6bcfff0) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_ADJUST_CLOCK) = 14
> [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd00c0) = 0
> [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bd0150 <unfinished 
> ...>
> [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd0050) = 0
> [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd0050) = 0
> [pid 53235] ioctl(13, KVM_CREATE_GUEST_MEMFD, 0x7ffdb6bd0050) = 10
> [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcffa0) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> [pid 53235] ioctl(13, KVM_SET_GSI_ROUTING, 0x55d227bbb830) = 0
> [pid 53235] ioctl(13, KVM_UNREGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
> [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
> [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
> [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfcd0) = 0
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_PIT_STATE2) = 1
> [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_PIT2) = 1
> [pid 53235] ioctl(13, KVM_CREATE_PIT2, 0x7ffdb6bd0040) = 0
> [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe40) = 0
> [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe90) = 0
> [pid 53239] ioctl(17, KVM_SET_SREGS2, 0x7f856d5fb340 <unfinished ...>
> [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> [pid 53239] ioctl(17, KVM_GET_TSC_KHZ, 0) = 2000000
> [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> [pid 53239] ioctl(17, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> [pid 53239] ioctl(17, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xfff0, rflags=0x2}) = 0
> [pid 53239] ioctl(17, KVM_SET_XSAVE, 0x7f84e0001000) = 0
> [pid 53239] ioctl(17, KVM_SET_XCRS, 0x7f856d5fb310) = 0
> [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 109
> [pid 53239] ioctl(17, KVM_SET_VCPU_EVENTS, 0x7f856d5fb550) = 0
> [pid 53239] ioctl(17, KVM_SET_MP_STATE, 0x7f856d5fb4c0) = 0
> [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
> [pid 53239] ioctl(17, KVM_SET_DEBUGREGS, 0x7f856d5fb550) = 0
> [pid 53240] ioctl(19, KVM_SET_SREGS2, 0x7f856cbfb340 <unfinished ...>
> [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> [pid 53240] ioctl(19, KVM_GET_TSC_KHZ, 0) = 2000000
> [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> [pid 53240] ioctl(19, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> [pid 53240] ioctl(19, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xb004, rflags=0x2}) = 0
> [pid 53240] ioctl(19, KVM_SET_XSAVE, 0x7f84d8001000) = 0
> [pid 53240] ioctl(19, KVM_SET_XCRS, 0x7f856cbfb310) = 0
> [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 109
> [pid 53240] ioctl(19, KVM_SET_VCPU_EVENTS, 0x7f856cbfb550) = 0
> [pid 53240] ioctl(19, KVM_SET_MP_STATE, 0x7f856cbfb4c0) = 0
> [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
> [pid 53240] ioctl(19, KVM_SET_DEBUGREGS, 0x7f856cbfb550) = 0
> [pid 53241] ioctl(21, KVM_SET_SREGS2, 0x7f84e7bfb340 <unfinished ...>
> [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> [pid 53241] ioctl(21, KVM_GET_TSC_KHZ, 0) = 2000000
> [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> [pid 53241] ioctl(21, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> [pid 53241] ioctl(21, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xb004, rflags=0x2}) = 0
> [pid 53241] ioctl(21, KVM_SET_XSAVE, 0x7f84d4001000) = 0
> [pid 53241] ioctl(21, KVM_SET_XCRS, 0x7f84e7bfb310) = 0
> [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 109
> [pid 53241] ioctl(21, KVM_SET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
> [pid 53241] ioctl(21, KVM_SET_MP_STATE, 0x7f84e7bfb4c0) = 0
> [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
> [pid 53241] ioctl(21, KVM_SET_DEBUGREGS, 0x7f84e7bfb550) = 0
> [pid 53242] ioctl(23, KVM_SET_SREGS2, 0x7f84e71fb340) = 0
> [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> [pid 53242] ioctl(23, KVM_GET_TSC_KHZ, 0) = 2000000
> [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> [pid 53242] ioctl(23, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> [pid 53242] ioctl(23, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xb004, rflags=0x2}) = 0
> [pid 53242] ioctl(23, KVM_SET_XSAVE, 0x7f84cc001000) = 0
> [pid 53242] ioctl(23, KVM_SET_XCRS, 0x7f84e71fb310) = 0
> [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 109
> [pid 53242] ioctl(23, KVM_SET_VCPU_EVENTS, 0x7f84e71fb550) = 0
> [pid 53242] ioctl(23, KVM_SET_MP_STATE, 0x7f84e71fb4c0) = 0
> [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
> [pid 53242] ioctl(23, KVM_SET_DEBUGREGS, 0x7f84e71fb550) = 0
> [pid 53239] ioctl(17, KVM_GET_VCPU_EVENTS, 0x7f856d5fb550) = 0
> [pid 53239] ioctl(17, KVM_GET_MP_STATE, 0x7f856d5fb4c0) = 0
> [pid 53239] ioctl(17, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xfff0, rflags=0x2}) = 0
> [pid 53239] ioctl(17, KVM_GET_XSAVE2, 0x7f84e0001000) = 0
> [pid 53239] ioctl(17, KVM_GET_XCRS, 0x7f856d5fb320) = 0
> [pid 53239] ioctl(17, KVM_GET_SREGS2, 0x7f856d5fb350) = 0
> [pid 53239] ioctl(17, KVM_GET_MSRS, 0x7f84e0002010) = 110
> [pid 53239] ioctl(17, KVM_GET_LAPIC, 0x7f856d5fb090) = 0
> [pid 53239] ioctl(17, KVM_GET_DEBUGREGS, 0x7f856d5fb550) = 0
> [pid 53240] ioctl(19, KVM_GET_VCPU_EVENTS, 0x7f856cbfb550) = 0
> [pid 53240] ioctl(19, KVM_GET_MP_STATE, 0x7f856cbfb4c0) = 0
> [pid 53240] ioctl(19, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xb004, rflags=0x2}) = 0
> [pid 53240] ioctl(19, KVM_GET_XSAVE2, 0x7f84d8001000) = 0
> [pid 53240] ioctl(19, KVM_GET_XCRS, 0x7f856cbfb320) = 0
> [pid 53240] ioctl(19, KVM_GET_SREGS2, 0x7f856cbfb350) = 0
> [pid 53240] ioctl(19, KVM_GET_MSRS, 0x7f84d8002010) = 110
> [pid 53240] ioctl(19, KVM_GET_LAPIC, 0x7f856cbfb090) = 0
> [pid 53240] ioctl(19, KVM_GET_DEBUGREGS, 0x7f856cbfb550) = 0
> [pid 53241] ioctl(21, KVM_GET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
> [pid 53241] ioctl(21, KVM_GET_MP_STATE, 0x7f84e7bfb4c0) = 0
> [pid 53241] ioctl(21, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xb004, rflags=0x2}) = 0
> [pid 53241] ioctl(21, KVM_GET_XSAVE2, 0x7f84d4001000) = 0
> [pid 53241] ioctl(21, KVM_GET_XCRS, 0x7f84e7bfb320) = 0
> [pid 53241] ioctl(21, KVM_GET_SREGS2, 0x7f84e7bfb350) = 0
> [pid 53241] ioctl(21, KVM_GET_MSRS, 0x7f84d4002010) = 110
> [pid 53241] ioctl(21, KVM_GET_LAPIC, 0x7f84e7bfb090) = 0
> [pid 53241] ioctl(21, KVM_GET_DEBUGREGS, 0x7f84e7bfb550) = 0
> [pid 53242] ioctl(23, KVM_GET_VCPU_EVENTS, 0x7f84e71fb550) = 0
> [pid 53242] ioctl(23, KVM_GET_MP_STATE, 0x7f84e71fb4c0) = 0
> [pid 53242] ioctl(23, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xb004, rflags=0x2}) = 0
> [pid 53242] ioctl(23, KVM_GET_XSAVE2, 0x7f84cc001000) = 0
> [pid 53242] ioctl(23, KVM_GET_XCRS, 0x7f84e71fb320) = 0
> [pid 53242] ioctl(23, KVM_GET_SREGS2, 0x7f84e71fb350) = 0
> [pid 53242] ioctl(23, KVM_GET_MSRS, 0x7f84cc002010) = 110
> [pid 53242] ioctl(23, KVM_GET_LAPIC, 0x7f84e71fb090) = 0
> [pid 53242] ioctl(23, KVM_GET_DEBUGREGS, 0x7f84e71fb550) = 0
> [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bd01d0) = 0
> [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bd0220) = 0
> [pid 53235] ioctl(13, KVM_GET_PIT2, 0x7ffdb6bd00b0) = 0
> [pid 53235] ioctl(13, KVM_SET_PIT2, 0x7ffdb6bd00d0) = 0
> [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcffa0) = 0
> [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe40) = 0
> [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe90) = 0
> [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe60) = 0
> [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfeb0) = 0
> [pid 53235] ioctl(13, KVM_SET_PIT2, 0x7ffdb6bcfe50) = 0
> [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcfce0) = 0
> [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcfce0) = 0
> [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe70) = 0
> [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfec0) = 0
> [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0
> <unfinished ...>
> [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
> [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
> [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
> [pid 53239] ioctl(17, KVM_TPR_ACCESS_REPORTING, 0x7f856d5fb5f0) = 0
> [pid 53240] ioctl(19, KVM_TPR_ACCESS_REPORTING, 0x7f856cbfb5f0 <unfinished 
> ...>
> [pid 53241] ioctl(21, KVM_TPR_ACCESS_REPORTING, 0x7f84e7bfb5f0) = 0
> [pid 53242] ioctl(23, KVM_TPR_ACCESS_REPORTING, 0x7f84e71fb5f0) = 0
> [pid 53235] ioctl(17, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0) = 0
> [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
> [pid 53239] ioctl(17, KVM_SET_LAPIC, 0x7f856d5fb200) = 0
> [pid 53235] ioctl(19, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
> [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
> [pid 53240] ioctl(19, KVM_SET_LAPIC, 0x7f856cbfb200) = 0
> [pid 53235] ioctl(21, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
> [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
> [pid 53241] ioctl(21, KVM_SET_LAPIC, 0x7f84e7bfb200) = 0
> [pid 53235] ioctl(23, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
> [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
> [pid 53242] ioctl(23, KVM_SET_LAPIC, 0x7f84e71fb200) = 0
> [pid 53239] ioctl(17, KVM_SET_SREGS2, 0x7f856d5fb340) = 0
> [pid 53239] ioctl(17, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xfff0, rflags=0x2}) = 0
> [pid 53239] ioctl(17, KVM_SET_XSAVE, 0x7f84e0001000) = 0
> [pid 53239] ioctl(17, KVM_SET_XCRS, 0x7f856d5fb310) = 0
> [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 109
> [pid 53239] ioctl(17, KVM_SET_VCPU_EVENTS, 0x7f856d5fb550) = 0
> [pid 53239] ioctl(17, KVM_SET_MP_STATE, 0x7f856d5fb4c0) = 0
> [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
> [pid 53239] ioctl(17, KVM_SET_DEBUGREGS, 0x7f856d5fb550) = 0
> [pid 53240] ioctl(19, KVM_SET_SREGS2, 0x7f856cbfb340) = 0
> [pid 53240] ioctl(19, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xb004, rflags=0x2}) = 0
> [pid 53240] ioctl(19, KVM_SET_XSAVE, 0x7f84d8001000) = 0
> [pid 53240] ioctl(19, KVM_SET_XCRS, 0x7f856cbfb310) = 0
> [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 109
> [pid 53240] ioctl(19, KVM_SET_VCPU_EVENTS, 0x7f856cbfb550) = 0
> [pid 53240] ioctl(19, KVM_SET_MP_STATE, 0x7f856cbfb4c0) = 0
> [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
> [pid 53240] ioctl(19, KVM_SET_DEBUGREGS, 0x7f856cbfb550) = 0
> [pid 53241] ioctl(21, KVM_SET_SREGS2, 0x7f84e7bfb340) = 0
> [pid 53241] ioctl(21, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xb004, rflags=0x2}) = 0
> [pid 53241] ioctl(21, KVM_SET_XSAVE, 0x7f84d4001000) = 0
> [pid 53241] ioctl(21, KVM_SET_XCRS, 0x7f84e7bfb310) = 0
> [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 109
> [pid 53241] ioctl(21, KVM_SET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
> [pid 53241] ioctl(21, KVM_SET_MP_STATE, 0x7f84e7bfb4c0) = 0
> [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
> [pid 53241] ioctl(21, KVM_SET_DEBUGREGS, 0x7f84e7bfb550) = 0
> [pid 53242] ioctl(23, KVM_SET_SREGS2, 0x7f84e71fb340) = 0
> [pid 53242] ioctl(23, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> rip=0xb004, rflags=0x2}) = 0
> [pid 53242] ioctl(23, KVM_SET_XSAVE, 0x7f84cc001000) = 0
> [pid 53242] ioctl(23, KVM_SET_XCRS, 0x7f84e71fb310) = 0
> [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 109
> [pid 53242] ioctl(23, KVM_SET_VCPU_EVENTS, 0x7f84e71fb550) = 0
> [pid 53242] ioctl(23, KVM_SET_MP_STATE, 0x7f84e71fb4c0) = 0
> [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
> [pid 53242] ioctl(23, KVM_SET_DEBUGREGS, 0x7f84e71fb550) = 0
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0 <unfinished ...>
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> (Argument list too long)
> [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = 0
> [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcf640) = 0
> [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bcf6d0) = -1
> EINVAL (Invalid argument)
> 
> On Mon, Aug 5, 2024 at 4:51 PM Roth, Michael <michael.r...@amd.com> wrote:
> >
> > [AMD Official Use Only - AMD Internal Distribution Only]
> >
> > > -----Original Message-----
> > > From: Paolo Bonzini <pbonz...@redhat.com>
> > > Sent: Monday, August 5, 2024 8:36 AM
> > > To: Arvid Picciani <arvid@kraud.cloud>
> > > Cc: Roth, Michael <michael.r...@amd.com>; qemu-discuss@nongnu.org
> > > Subject: Re: SNP: qemu upstream vs AMD fork on kernel 6.11
> > >
> > > On Mon, Aug 5, 2024 at 3:26 PM Arvid Picciani <arvid@kraud.cloud> wrote:
> > > >
> > > > Hi,
> > > >
> > > > with linux 6.11 it looks like kvm SNP host api is finally there.
> > > >
> > > > However, current qemu upstream appears to be tested against a much
> > > > older kernel by redhat (according to the libvirt IRC its via coconut
> > > > svsm),
> > >
> > > It's tested against both 6.11 (actually a slightly older branch in
> > > kvm.git) and the CentOS Stream 9 kernel. The CentOS Stream 9 kernel
> > > has the same SNP code as Linux 6.11.
> > >
> > > > while the current head of the amd fork on github works just
> > > > fine with 6.11.
> > >
> > > The current head of the AMD fork (https://github.com/AMDESE/qemu
> > > snp-latest) is not in line with the upstream kernel, for example:
> > >
> > > 66e7fbadfc8 i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State Changes
> > > e9898385037 i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State
> > > Changes (MSR-based)
> >
> > It actually adds the KVM_HC_MAP_GPA_RANGE handling on top, and then drops 
> > all KVM_EXIT_VMGEXIT handling completely as part of:
> >
> >   commit 62434c7dd57fcf2e02f6765b9d0d2588b5e032d3
> >   Author: Michael Roth <michael.r...@amd.com>
> >   Date:   Wed May 1 01:14:39 2024 -0500
> >
> >       *i386/sev: Rework GHCB extended guest request handling
> >
> >       TODO: drop the PSC patches completely so this rework can become a 
> > clean
> >       standalone patch.
> >
> > The v4 patches that actually went into QEMU 9.1 have this changeset 
> > appropriately split/squashed into their proper place, but I think the 
> > upstream behavior should be about the same as what is in snp-latest QEMU 
> > tree currently.
> >
> > If snp-latest works, but upstream QEMU does not, then there is potentially 
> > a regression upstream. However I just re-tested latest QEMU commit 
> > (f9851d2ffef5) against upstream KVM and didn't see any issue.
> >
> > QEMU 9.1 is already is hard-freeze, so if there is a confirmed breakage 
> > please share the full details and steps to reproduce so it can hopefully be 
> > sorted before the 9.1 release.
> >
> > -Mike
> >
> > >
> > > What problems are you seeing with Linux 6.11?
> > >
> > > Paolo
> > >
> > > > there's also this old patch missing to enable virtiofsd
> > > > https://lists.gnu.org/archive/html/qemu-devel/2022-01/msg03456.html
> > > >
> > > > i would rebase that and send it again, but current main is broken on
> > > > 6.11, so wondering where qemu is heading.
> > > >
> > > > thanks
> > > >
> > > >
> > > >
> > > > --
> > > > https://kraudcloud.com/
> > > > devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani
> > > > Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B
> > > >
> >
> 
> 
> -- 
> https://kraudcloud.com/
> devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani
> Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B


Reply via email to