that was it, thanks a ton!

i got confused because -bios with OVMF_CODE.fd said "qemu: could not
load PC BIOS".
but i only realized i'm using the wrong image after you wrote that.


works now with upstream kernel, qemu and ovmf. thanks so much for
getting this thing upstream.

On Mon, Aug 5, 2024 at 7:42 PM Michael Roth <michael.r...@amd.com> wrote:
>
> On Mon, Aug 05, 2024 at 07:07:36PM +0200, Arvid Picciani wrote:
> > thanks all, it must be my call args then i guess.
> >
> > with f9851d2ffef5 ovmf has to be loaded with
> >
> > -drive 
> > if=pflash,format=raw,unit=0,file=/AMDSEV/usr/local/share/qemu/OVMF_CODE.fd
> > -drive if=pflash,format=raw,unit=1,file=/AMDSEV/null.fd
>
> This is actually the old way SNP expected the BIOS to be loaded. Upstream
> QEMU expects one to use -bios.
>
> It may be possible that if=pflash just happens to not immediately fail for
> you, but that's no longer the supported method and you may be getting some
> sort of unexpected behavior because of it.
>
> >
> > while the amd fork only accepts it via -bios
>
> The only difference I'm aware of with snp-latest branch is that it
> allows you to continue to specify:
>
>   -drive if=pflash,format=raw,unit=1,file=/AMDSEV/null.fd
>
> for the OVMF VARS image if you built with split OVMF CODE/VARS images. But
> with upstream QEMU only the single-image OVMF is supported (via -bios).
>
> >
> > thats the only thing i changed from the AMD reference launch.sh.
> > i get the dreaded "SNP_LAUNCH_UPDATE ret=-22 fw_error=0 '' with
>
> Yah, I try to use -drive if=pflash to specify OVMF BIOS like you are
> doing above with f9851d2ffef5, then I get the same error. It's not
> the most graceful failure path, but I'd consider it expected since you
> are providing a BIOS in the expected manner which could certainly cause
> a failure during SNP_LAUNCH_UPDATE's attempts to measure/encrypt it.
>
> So try switch to non-split OVMF image and using -bios to specify it and
> it seems likely that would avoid the error.
>
> -Mike
>
> > upstream qemu, which in the past indicated a mismatch between host
> > kernel and qemu api.
> >
> > from strace, i'm assuming something with memory changed, since
> > KVM_MEMORY_ENCRYPT_OP fails,
> > but the  documentation for how memory backend works is missing in
> > qemu/docs/system/i386/amd-memory-encryption.rst or its automatic now?
> >
> > here's the full args and strace
> >
> > /root/qemu/build/qemu-bundle/usr/bin/qemu-system-x86_64 \
> > -enable-kvm -cpu EPYC-v4 -machine q35 -smp 4,maxcpus=255 -m
> > 2048M,slots=5,maxmem=10240M -no-reboot -drive
> > if=pflash,format=raw,unit=0,file=/AMDSEV/usr/local/share/qemu/OVMF_CODE.fd
> > -drive 
> > if=pflash,format=raw,unit=1,file=/AMDSEV/debian-12-genericcloud-amd64-20240717-1811.fd
> > -netdev user,id=vmnic  -device
> > virtio-net-pci,disable-legacy=on,iommu_platform=true,netdev=vmnic,romfile=
> > -drive 
> > file=/root/debian-12-genericcloud-amd64-20240717-1811.raw,if=none,id=disk0,format=raw
> > -device virtio-scsi-pci,id=scsi0,disable-legacy=on,iommu_platform=true
> > -device scsi-hd,drive=disk0 -machine memory-encryption=sev0,vmport=off
> > -object memory-backend-memfd,id=ram1,size=2048M,share=true,prealloc=false
> > -machine memory-backend=ram1 -object
> > sev-snp-guest,id=sev0,policy=0xb0000,cbitpos=51,reduced-phys-bits=1
> > -nographic -monitor pty -monitor unix:monitor,server,nowait  -device
> > virtio-serial-pci
> >
> >
> >
> >
> > root@localhost:~# sh q.sh 2>&1 | grep KVM
> > [pid 53235] ioctl(12, KVM_GET_API_VERSION, 0) = 12
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MEMORY_ATTRIBUTES) = 8
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GUEST_MEMFD) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_USER_MEMORY2) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IMMEDIATE_EXIT) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_NR_MEMSLOTS) = 32764
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MULTI_ADDRESS_SPACE) = 2
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VM_TYPES) = 31
> > [pid 53235] ioctl(12, KVM_CREATE_VM, 0x4 <unfinished ...>
> > [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS) = 128
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MAX_VCPUS) = 4096
> > [pid 53235] write(2, "Number of hotpluggable cpus requ"..., 95Number
> > of hotpluggable cpus requested (255) exceeds the recommended cpus
> > supported by KVM (128)) = 95
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_USER_MEMORY) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
> > KVM_CAP_DESTROY_MEMORY_REGION_WORKS) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
> > KVM_CAP_JOIN_MEMORY_REGIONS_WORKS) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_INTERNAL_ERROR_DATA) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IOEVENTFD) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IOEVENTFD_ANY_LENGTH) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_TSS_ADDR) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_EXT_CPUID) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MP_STATE) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SIGNAL_MSI) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_DEBUGREGS) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VCPU_EVENTS) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_ROBUST_SINGLESTEP) = 
> > 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_ADJUST_CLOCK) = 14
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_IDENTITY_MAP_ADDR) = 
> > 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_COALESCED_MMIO) = 2
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_COALESCED_PIO) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
> > KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2) = 3
> > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd0370) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VCPU_EVENTS) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_NESTED_STATE) = 4224
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_INJECT_STATUS) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_READONLY_MEM) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQFD_RESAMPLE) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VM_ATTRIBUTES) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_GUEST_DEBUG) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_GUEST_DEBUG2) = 
> > 2031619
> > [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bd0040) = 0
> > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bcff10) = 0
> > [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bcffa0) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XCRS) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SREGS2) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV_VP_INDEX) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_EXCEPTION_PAYLOAD) = 1
> > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_TRIPLE_FAULT_EVENT) 
> > = 1
> > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
> > [pid 53235] ioctl(12, KVM_GET_MSR_INDEX_LIST, 0x7ffdb6bd00f0) = -1
> > E2BIG (Argument list too long)
> > [pid 53235] ioctl(12, KVM_GET_MSR_INDEX_LIST, 0x55d227634b40) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_MSR_FEATURES) = 1
> > [pid 53235] ioctl(12, KVM_GET_MSR_FEATURE_INDEX_LIST, 0x7ffdb6bd00f0)
> > = -1 E2BIG (Argument list too long)
> > [pid 53235] ioctl(12, KVM_GET_MSR_FEATURE_INDEX_LIST, 0x55d2273a3ef0) = 0
> > [pid 53235] ioctl(13, KVM_SET_IDENTITY_MAP_ADDR, 0x7ffdb6bd00e0) = 0
> > [pid 53235] ioctl(13, KVM_SET_TSS_ADDR, 0xfeffd000) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_SMM) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_NOTIFY_VMEXIT) = 0
> > [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_X86_USER_SPACE_MSR) = 1
> > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
> > [pid 53235] ioctl(13, KVM_X86_SET_MSR_FILTER, 0x7ffdb6bcff30) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQCHIP) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQFD) = 1
> > [pid 53235] ioctl(13, KVM_CREATE_IRQCHIP, 0) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> > [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_SYNC_MMU) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_BINARY_STATS_FD) = 1
> > [pid 53235] ioctl(13, KVM_CREATE_GUEST_MEMFD, 0x7ffdb6bd0080) = 16
> > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd0210) = 0
> > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725920) = -1
> > E2BIG (Argument list too long)
> > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725960) = -1
> > E2BIG (Argument list too long)
> > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725a40) = -1
> > E2BIG (Argument list too long)
> > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725a40) = -1
> > E2BIG (Argument list too long)
> > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725b90) = -1
> > E2BIG (Argument list too long)
> > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725e20) = -1
> > E2BIG (Argument list too long)
> > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, {nent=61, entries=[...]}) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > [pid 53239] ioctl(13, KVM_CREATE_VCPU, 0) = 17
> > [pid 53239] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > [pid 53239] ioctl(17, KVM_GET_TSC_KHZ, 0) = 2000000
> > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> > [pid 53239] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f856d5fa578) = 0
> > [pid 53239] ioctl(17, KVM_X86_SETUP_MCE, 0x55d227724b38) = 0
> > [pid 53239] ioctl(17, KVM_SET_CPUID2, {nent=29, entries=[...]}) = 0
> > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 2
> > [pid 53239] ioctl(17, KVM_GET_STATS_FD, 0) = 18
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > [pid 53240] ioctl(13, KVM_CREATE_VCPU, 1) = 19
> > [pid 53240] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > [pid 53240] ioctl(19, KVM_GET_TSC_KHZ, 0) = 2000000
> > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> > [pid 53240] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f856cbfa578) = 0
> > [pid 53240] ioctl(19, KVM_X86_SETUP_MCE, 0x55d227757e48) = 0
> > [pid 53240] ioctl(19, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
> > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 2
> > [pid 53240] ioctl(19, KVM_GET_STATS_FD, 0) = 20
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING <unfinished 
> > ...>
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > [pid 53241] ioctl(13, KVM_CREATE_VCPU, 2) = 21
> > [pid 53241] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > [pid 53241] ioctl(21, KVM_GET_TSC_KHZ, 0) = 2000000
> > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> > [pid 53241] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f84e7bfa578) = 0
> > [pid 53241] ioctl(21, KVM_X86_SETUP_MCE, 0x55d227761e18) = 0
> > [pid 53241] ioctl(21, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
> > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 2
> > [pid 53241] ioctl(21, KVM_GET_STATS_FD, 0) = 22
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > [pid 53242] ioctl(13, KVM_CREATE_VCPU, 3) = 23
> > [pid 53242] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > [pid 53242] ioctl(23, KVM_GET_TSC_KHZ, 0) = 2000000
> > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> > [pid 53242] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f84e71fa578) = 0
> > [pid 53242] ioctl(23, KVM_X86_SETUP_MCE, 0x55d22776bd18) = 0
> > [pid 53242] ioctl(23, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
> > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 2
> > [pid 53242] ioctl(23, KVM_GET_STATS_FD, 0) = 24
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING <unfinished 
> > ...>
> > [pid 53235] ioctl(13, KVM_GET_CLOCK, 0x7ffdb6bcfff0) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_ADJUST_CLOCK) = 14
> > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd00c0) = 0
> > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bd0150 <unfinished 
> > ...>
> > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd0050) = 0
> > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd0050) = 0
> > [pid 53235] ioctl(13, KVM_CREATE_GUEST_MEMFD, 0x7ffdb6bd0050) = 10
> > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcffa0) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> > [pid 53235] ioctl(13, KVM_SET_GSI_ROUTING, 0x55d227bbb830) = 0
> > [pid 53235] ioctl(13, KVM_UNREGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
> > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
> > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
> > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfcd0) = 0
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_PIT_STATE2) = 1
> > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_PIT2) = 1
> > [pid 53235] ioctl(13, KVM_CREATE_PIT2, 0x7ffdb6bd0040) = 0
> > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe40) = 0
> > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe90) = 0
> > [pid 53239] ioctl(17, KVM_SET_SREGS2, 0x7f856d5fb340 <unfinished ...>
> > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > [pid 53239] ioctl(17, KVM_GET_TSC_KHZ, 0) = 2000000
> > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> > [pid 53239] ioctl(17, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> > [pid 53239] ioctl(17, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xfff0, rflags=0x2}) = 0
> > [pid 53239] ioctl(17, KVM_SET_XSAVE, 0x7f84e0001000) = 0
> > [pid 53239] ioctl(17, KVM_SET_XCRS, 0x7f856d5fb310) = 0
> > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 109
> > [pid 53239] ioctl(17, KVM_SET_VCPU_EVENTS, 0x7f856d5fb550) = 0
> > [pid 53239] ioctl(17, KVM_SET_MP_STATE, 0x7f856d5fb4c0) = 0
> > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
> > [pid 53239] ioctl(17, KVM_SET_DEBUGREGS, 0x7f856d5fb550) = 0
> > [pid 53240] ioctl(19, KVM_SET_SREGS2, 0x7f856cbfb340 <unfinished ...>
> > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > [pid 53240] ioctl(19, KVM_GET_TSC_KHZ, 0) = 2000000
> > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> > [pid 53240] ioctl(19, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> > [pid 53240] ioctl(19, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xb004, rflags=0x2}) = 0
> > [pid 53240] ioctl(19, KVM_SET_XSAVE, 0x7f84d8001000) = 0
> > [pid 53240] ioctl(19, KVM_SET_XCRS, 0x7f856cbfb310) = 0
> > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 109
> > [pid 53240] ioctl(19, KVM_SET_VCPU_EVENTS, 0x7f856cbfb550) = 0
> > [pid 53240] ioctl(19, KVM_SET_MP_STATE, 0x7f856cbfb4c0) = 0
> > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
> > [pid 53240] ioctl(19, KVM_SET_DEBUGREGS, 0x7f856cbfb550) = 0
> > [pid 53241] ioctl(21, KVM_SET_SREGS2, 0x7f84e7bfb340 <unfinished ...>
> > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > [pid 53241] ioctl(21, KVM_GET_TSC_KHZ, 0) = 2000000
> > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> > [pid 53241] ioctl(21, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> > [pid 53241] ioctl(21, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xb004, rflags=0x2}) = 0
> > [pid 53241] ioctl(21, KVM_SET_XSAVE, 0x7f84d4001000) = 0
> > [pid 53241] ioctl(21, KVM_SET_XCRS, 0x7f84e7bfb310) = 0
> > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 109
> > [pid 53241] ioctl(21, KVM_SET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
> > [pid 53241] ioctl(21, KVM_SET_MP_STATE, 0x7f84e7bfb4c0) = 0
> > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
> > [pid 53241] ioctl(21, KVM_SET_DEBUGREGS, 0x7f84e7bfb550) = 0
> > [pid 53242] ioctl(23, KVM_SET_SREGS2, 0x7f84e71fb340) = 0
> > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > [pid 53242] ioctl(23, KVM_GET_TSC_KHZ, 0) = 2000000
> > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> > [pid 53242] ioctl(23, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> > [pid 53242] ioctl(23, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xb004, rflags=0x2}) = 0
> > [pid 53242] ioctl(23, KVM_SET_XSAVE, 0x7f84cc001000) = 0
> > [pid 53242] ioctl(23, KVM_SET_XCRS, 0x7f84e71fb310) = 0
> > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 109
> > [pid 53242] ioctl(23, KVM_SET_VCPU_EVENTS, 0x7f84e71fb550) = 0
> > [pid 53242] ioctl(23, KVM_SET_MP_STATE, 0x7f84e71fb4c0) = 0
> > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
> > [pid 53242] ioctl(23, KVM_SET_DEBUGREGS, 0x7f84e71fb550) = 0
> > [pid 53239] ioctl(17, KVM_GET_VCPU_EVENTS, 0x7f856d5fb550) = 0
> > [pid 53239] ioctl(17, KVM_GET_MP_STATE, 0x7f856d5fb4c0) = 0
> > [pid 53239] ioctl(17, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xfff0, rflags=0x2}) = 0
> > [pid 53239] ioctl(17, KVM_GET_XSAVE2, 0x7f84e0001000) = 0
> > [pid 53239] ioctl(17, KVM_GET_XCRS, 0x7f856d5fb320) = 0
> > [pid 53239] ioctl(17, KVM_GET_SREGS2, 0x7f856d5fb350) = 0
> > [pid 53239] ioctl(17, KVM_GET_MSRS, 0x7f84e0002010) = 110
> > [pid 53239] ioctl(17, KVM_GET_LAPIC, 0x7f856d5fb090) = 0
> > [pid 53239] ioctl(17, KVM_GET_DEBUGREGS, 0x7f856d5fb550) = 0
> > [pid 53240] ioctl(19, KVM_GET_VCPU_EVENTS, 0x7f856cbfb550) = 0
> > [pid 53240] ioctl(19, KVM_GET_MP_STATE, 0x7f856cbfb4c0) = 0
> > [pid 53240] ioctl(19, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xb004, rflags=0x2}) = 0
> > [pid 53240] ioctl(19, KVM_GET_XSAVE2, 0x7f84d8001000) = 0
> > [pid 53240] ioctl(19, KVM_GET_XCRS, 0x7f856cbfb320) = 0
> > [pid 53240] ioctl(19, KVM_GET_SREGS2, 0x7f856cbfb350) = 0
> > [pid 53240] ioctl(19, KVM_GET_MSRS, 0x7f84d8002010) = 110
> > [pid 53240] ioctl(19, KVM_GET_LAPIC, 0x7f856cbfb090) = 0
> > [pid 53240] ioctl(19, KVM_GET_DEBUGREGS, 0x7f856cbfb550) = 0
> > [pid 53241] ioctl(21, KVM_GET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
> > [pid 53241] ioctl(21, KVM_GET_MP_STATE, 0x7f84e7bfb4c0) = 0
> > [pid 53241] ioctl(21, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xb004, rflags=0x2}) = 0
> > [pid 53241] ioctl(21, KVM_GET_XSAVE2, 0x7f84d4001000) = 0
> > [pid 53241] ioctl(21, KVM_GET_XCRS, 0x7f84e7bfb320) = 0
> > [pid 53241] ioctl(21, KVM_GET_SREGS2, 0x7f84e7bfb350) = 0
> > [pid 53241] ioctl(21, KVM_GET_MSRS, 0x7f84d4002010) = 110
> > [pid 53241] ioctl(21, KVM_GET_LAPIC, 0x7f84e7bfb090) = 0
> > [pid 53241] ioctl(21, KVM_GET_DEBUGREGS, 0x7f84e7bfb550) = 0
> > [pid 53242] ioctl(23, KVM_GET_VCPU_EVENTS, 0x7f84e71fb550) = 0
> > [pid 53242] ioctl(23, KVM_GET_MP_STATE, 0x7f84e71fb4c0) = 0
> > [pid 53242] ioctl(23, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xb004, rflags=0x2}) = 0
> > [pid 53242] ioctl(23, KVM_GET_XSAVE2, 0x7f84cc001000) = 0
> > [pid 53242] ioctl(23, KVM_GET_XCRS, 0x7f84e71fb320) = 0
> > [pid 53242] ioctl(23, KVM_GET_SREGS2, 0x7f84e71fb350) = 0
> > [pid 53242] ioctl(23, KVM_GET_MSRS, 0x7f84cc002010) = 110
> > [pid 53242] ioctl(23, KVM_GET_LAPIC, 0x7f84e71fb090) = 0
> > [pid 53242] ioctl(23, KVM_GET_DEBUGREGS, 0x7f84e71fb550) = 0
> > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bd01d0) = 0
> > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bd0220) = 0
> > [pid 53235] ioctl(13, KVM_GET_PIT2, 0x7ffdb6bd00b0) = 0
> > [pid 53235] ioctl(13, KVM_SET_PIT2, 0x7ffdb6bd00d0) = 0
> > [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcffa0) = 0
> > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe40) = 0
> > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe90) = 0
> > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe60) = 0
> > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfeb0) = 0
> > [pid 53235] ioctl(13, KVM_SET_PIT2, 0x7ffdb6bcfe50) = 0
> > [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcfce0) = 0
> > [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcfce0) = 0
> > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe70) = 0
> > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfec0) = 0
> > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0
> > <unfinished ...>
> > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
> > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
> > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
> > [pid 53239] ioctl(17, KVM_TPR_ACCESS_REPORTING, 0x7f856d5fb5f0) = 0
> > [pid 53240] ioctl(19, KVM_TPR_ACCESS_REPORTING, 0x7f856cbfb5f0 <unfinished 
> > ...>
> > [pid 53241] ioctl(21, KVM_TPR_ACCESS_REPORTING, 0x7f84e7bfb5f0) = 0
> > [pid 53242] ioctl(23, KVM_TPR_ACCESS_REPORTING, 0x7f84e71fb5f0) = 0
> > [pid 53235] ioctl(17, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0) = 0
> > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
> > [pid 53239] ioctl(17, KVM_SET_LAPIC, 0x7f856d5fb200) = 0
> > [pid 53235] ioctl(19, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
> > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
> > [pid 53240] ioctl(19, KVM_SET_LAPIC, 0x7f856cbfb200) = 0
> > [pid 53235] ioctl(21, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
> > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
> > [pid 53241] ioctl(21, KVM_SET_LAPIC, 0x7f84e7bfb200) = 0
> > [pid 53235] ioctl(23, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
> > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
> > [pid 53242] ioctl(23, KVM_SET_LAPIC, 0x7f84e71fb200) = 0
> > [pid 53239] ioctl(17, KVM_SET_SREGS2, 0x7f856d5fb340) = 0
> > [pid 53239] ioctl(17, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xfff0, rflags=0x2}) = 0
> > [pid 53239] ioctl(17, KVM_SET_XSAVE, 0x7f84e0001000) = 0
> > [pid 53239] ioctl(17, KVM_SET_XCRS, 0x7f856d5fb310) = 0
> > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 109
> > [pid 53239] ioctl(17, KVM_SET_VCPU_EVENTS, 0x7f856d5fb550) = 0
> > [pid 53239] ioctl(17, KVM_SET_MP_STATE, 0x7f856d5fb4c0) = 0
> > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
> > [pid 53239] ioctl(17, KVM_SET_DEBUGREGS, 0x7f856d5fb550) = 0
> > [pid 53240] ioctl(19, KVM_SET_SREGS2, 0x7f856cbfb340) = 0
> > [pid 53240] ioctl(19, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xb004, rflags=0x2}) = 0
> > [pid 53240] ioctl(19, KVM_SET_XSAVE, 0x7f84d8001000) = 0
> > [pid 53240] ioctl(19, KVM_SET_XCRS, 0x7f856cbfb310) = 0
> > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 109
> > [pid 53240] ioctl(19, KVM_SET_VCPU_EVENTS, 0x7f856cbfb550) = 0
> > [pid 53240] ioctl(19, KVM_SET_MP_STATE, 0x7f856cbfb4c0) = 0
> > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
> > [pid 53240] ioctl(19, KVM_SET_DEBUGREGS, 0x7f856cbfb550) = 0
> > [pid 53241] ioctl(21, KVM_SET_SREGS2, 0x7f84e7bfb340) = 0
> > [pid 53241] ioctl(21, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xb004, rflags=0x2}) = 0
> > [pid 53241] ioctl(21, KVM_SET_XSAVE, 0x7f84d4001000) = 0
> > [pid 53241] ioctl(21, KVM_SET_XCRS, 0x7f84e7bfb310) = 0
> > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 109
> > [pid 53241] ioctl(21, KVM_SET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
> > [pid 53241] ioctl(21, KVM_SET_MP_STATE, 0x7f84e7bfb4c0) = 0
> > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
> > [pid 53241] ioctl(21, KVM_SET_DEBUGREGS, 0x7f84e7bfb550) = 0
> > [pid 53242] ioctl(23, KVM_SET_SREGS2, 0x7f84e71fb340) = 0
> > [pid 53242] ioctl(23, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > rip=0xb004, rflags=0x2}) = 0
> > [pid 53242] ioctl(23, KVM_SET_XSAVE, 0x7f84cc001000) = 0
> > [pid 53242] ioctl(23, KVM_SET_XCRS, 0x7f84e71fb310) = 0
> > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 109
> > [pid 53242] ioctl(23, KVM_SET_VCPU_EVENTS, 0x7f84e71fb550) = 0
> > [pid 53242] ioctl(23, KVM_SET_MP_STATE, 0x7f84e71fb4c0) = 0
> > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
> > [pid 53242] ioctl(23, KVM_SET_DEBUGREGS, 0x7f84e71fb550) = 0
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0 <unfinished ...>
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > (Argument list too long)
> > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = 0
> > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcf640) = 0
> > [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bcf6d0) = -1
> > EINVAL (Invalid argument)
> >
> > On Mon, Aug 5, 2024 at 4:51 PM Roth, Michael <michael.r...@amd.com> wrote:
> > >
> > > [AMD Official Use Only - AMD Internal Distribution Only]
> > >
> > > > -----Original Message-----
> > > > From: Paolo Bonzini <pbonz...@redhat.com>
> > > > Sent: Monday, August 5, 2024 8:36 AM
> > > > To: Arvid Picciani <arvid@kraud.cloud>
> > > > Cc: Roth, Michael <michael.r...@amd.com>; qemu-discuss@nongnu.org
> > > > Subject: Re: SNP: qemu upstream vs AMD fork on kernel 6.11
> > > >
> > > > On Mon, Aug 5, 2024 at 3:26 PM Arvid Picciani <arvid@kraud.cloud> wrote:
> > > > >
> > > > > Hi,
> > > > >
> > > > > with linux 6.11 it looks like kvm SNP host api is finally there.
> > > > >
> > > > > However, current qemu upstream appears to be tested against a much
> > > > > older kernel by redhat (according to the libvirt IRC its via coconut
> > > > > svsm),
> > > >
> > > > It's tested against both 6.11 (actually a slightly older branch in
> > > > kvm.git) and the CentOS Stream 9 kernel. The CentOS Stream 9 kernel
> > > > has the same SNP code as Linux 6.11.
> > > >
> > > > > while the current head of the amd fork on github works just
> > > > > fine with 6.11.
> > > >
> > > > The current head of the AMD fork (https://github.com/AMDESE/qemu
> > > > snp-latest) is not in line with the upstream kernel, for example:
> > > >
> > > > 66e7fbadfc8 i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State 
> > > > Changes
> > > > e9898385037 i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State
> > > > Changes (MSR-based)
> > >
> > > It actually adds the KVM_HC_MAP_GPA_RANGE handling on top, and then drops 
> > > all KVM_EXIT_VMGEXIT handling completely as part of:
> > >
> > >   commit 62434c7dd57fcf2e02f6765b9d0d2588b5e032d3
> > >   Author: Michael Roth <michael.r...@amd.com>
> > >   Date:   Wed May 1 01:14:39 2024 -0500
> > >
> > >       *i386/sev: Rework GHCB extended guest request handling
> > >
> > >       TODO: drop the PSC patches completely so this rework can become a 
> > > clean
> > >       standalone patch.
> > >
> > > The v4 patches that actually went into QEMU 9.1 have this changeset 
> > > appropriately split/squashed into their proper place, but I think the 
> > > upstream behavior should be about the same as what is in snp-latest QEMU 
> > > tree currently.
> > >
> > > If snp-latest works, but upstream QEMU does not, then there is 
> > > potentially a regression upstream. However I just re-tested latest QEMU 
> > > commit (f9851d2ffef5) against upstream KVM and didn't see any issue.
> > >
> > > QEMU 9.1 is already is hard-freeze, so if there is a confirmed breakage 
> > > please share the full details and steps to reproduce so it can hopefully 
> > > be sorted before the 9.1 release.
> > >
> > > -Mike
> > >
> > > >
> > > > What problems are you seeing with Linux 6.11?
> > > >
> > > > Paolo
> > > >
> > > > > there's also this old patch missing to enable virtiofsd
> > > > > https://lists.gnu.org/archive/html/qemu-devel/2022-01/msg03456.html
> > > > >
> > > > > i would rebase that and send it again, but current main is broken on
> > > > > 6.11, so wondering where qemu is heading.
> > > > >
> > > > > thanks
> > > > >
> > > > >
> > > > >
> > > > > --
> > > > > https://kraudcloud.com/
> > > > > devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani
> > > > > Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B
> > > > >
> > >
> >
> >
> > --
> > https://kraudcloud.com/
> > devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani
> > Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B



-- 
https://kraudcloud.com/
devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani
Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B

Reply via email to