On Mon, Aug 05, 2024 at 07:55:23PM +0200, Arvid Picciani wrote: > that was it, thanks a ton! > > i got confused because -bios with OVMF_CODE.fd said "qemu: could not > load PC BIOS". > but i only realized i'm using the wrong image after you wrote that. > > > works now with upstream kernel, qemu and ovmf. thanks so much for > getting this thing upstream.
Glad you got it working! Thanks for testing :) -Mike > > On Mon, Aug 5, 2024 at 7:42 PM Michael Roth <michael.r...@amd.com> wrote: > > > > On Mon, Aug 05, 2024 at 07:07:36PM +0200, Arvid Picciani wrote: > > > thanks all, it must be my call args then i guess. > > > > > > with f9851d2ffef5 ovmf has to be loaded with > > > > > > -drive > > > if=pflash,format=raw,unit=0,file=/AMDSEV/usr/local/share/qemu/OVMF_CODE.fd > > > -drive if=pflash,format=raw,unit=1,file=/AMDSEV/null.fd > > > > This is actually the old way SNP expected the BIOS to be loaded. Upstream > > QEMU expects one to use -bios. > > > > It may be possible that if=pflash just happens to not immediately fail for > > you, but that's no longer the supported method and you may be getting some > > sort of unexpected behavior because of it. > > > > > > > > while the amd fork only accepts it via -bios > > > > The only difference I'm aware of with snp-latest branch is that it > > allows you to continue to specify: > > > > -drive if=pflash,format=raw,unit=1,file=/AMDSEV/null.fd > > > > for the OVMF VARS image if you built with split OVMF CODE/VARS images. But > > with upstream QEMU only the single-image OVMF is supported (via -bios). > > > > > > > > thats the only thing i changed from the AMD reference launch.sh. > > > i get the dreaded "SNP_LAUNCH_UPDATE ret=-22 fw_error=0 '' with > > > > Yah, I try to use -drive if=pflash to specify OVMF BIOS like you are > > doing above with f9851d2ffef5, then I get the same error. It's not > > the most graceful failure path, but I'd consider it expected since you > > are providing a BIOS in the expected manner which could certainly cause > > a failure during SNP_LAUNCH_UPDATE's attempts to measure/encrypt it. > > > > So try switch to non-split OVMF image and using -bios to specify it and > > it seems likely that would avoid the error. > > > > -Mike > > > > > upstream qemu, which in the past indicated a mismatch between host > > > kernel and qemu api. > > > > > > from strace, i'm assuming something with memory changed, since > > > KVM_MEMORY_ENCRYPT_OP fails, > > > but the documentation for how memory backend works is missing in > > > qemu/docs/system/i386/amd-memory-encryption.rst or its automatic now? > > > > > > here's the full args and strace > > > > > > /root/qemu/build/qemu-bundle/usr/bin/qemu-system-x86_64 \ > > > -enable-kvm -cpu EPYC-v4 -machine q35 -smp 4,maxcpus=255 -m > > > 2048M,slots=5,maxmem=10240M -no-reboot -drive > > > if=pflash,format=raw,unit=0,file=/AMDSEV/usr/local/share/qemu/OVMF_CODE.fd > > > -drive > > > if=pflash,format=raw,unit=1,file=/AMDSEV/debian-12-genericcloud-amd64-20240717-1811.fd > > > -netdev user,id=vmnic -device > > > virtio-net-pci,disable-legacy=on,iommu_platform=true,netdev=vmnic,romfile= > > > -drive > > > file=/root/debian-12-genericcloud-amd64-20240717-1811.raw,if=none,id=disk0,format=raw > > > -device virtio-scsi-pci,id=scsi0,disable-legacy=on,iommu_platform=true > > > -device scsi-hd,drive=disk0 -machine memory-encryption=sev0,vmport=off > > > -object memory-backend-memfd,id=ram1,size=2048M,share=true,prealloc=false > > > -machine memory-backend=ram1 -object > > > sev-snp-guest,id=sev0,policy=0xb0000,cbitpos=51,reduced-phys-bits=1 > > > -nographic -monitor pty -monitor unix:monitor,server,nowait -device > > > virtio-serial-pci > > > > > > > > > > > > > > > root@localhost:~# sh q.sh 2>&1 | grep KVM > > > [pid 53235] ioctl(12, KVM_GET_API_VERSION, 0) = 12 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MEMORY_ATTRIBUTES) = 8 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GUEST_MEMFD) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_USER_MEMORY2) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IMMEDIATE_EXIT) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_NR_MEMSLOTS) = 32764 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MULTI_ADDRESS_SPACE) = > > > 2 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VM_TYPES) = 31 > > > [pid 53235] ioctl(12, KVM_CREATE_VM, 0x4 <unfinished ...> > > > [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS) = 128 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MAX_VCPUS) = 4096 > > > [pid 53235] write(2, "Number of hotpluggable cpus requ"..., 95Number > > > of hotpluggable cpus requested (255) exceeds the recommended cpus > > > supported by KVM (128)) = 95 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_USER_MEMORY) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, > > > KVM_CAP_DESTROY_MEMORY_REGION_WORKS) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, > > > KVM_CAP_JOIN_MEMORY_REGIONS_WORKS) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_INTERNAL_ERROR_DATA) = > > > 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IOEVENTFD) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IOEVENTFD_ANY_LENGTH) > > > = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_TSS_ADDR) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_EXT_CPUID) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MP_STATE) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SIGNAL_MSI) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_DEBUGREGS) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VCPU_EVENTS) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_ROBUST_SINGLESTEP) > > > = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_ADJUST_CLOCK) = 14 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_IDENTITY_MAP_ADDR) > > > = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_COALESCED_MMIO) = 2 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_COALESCED_PIO) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, > > > KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2) = 3 > > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd0370) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VCPU_EVENTS) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_NESTED_STATE) = 4224 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_INJECT_STATUS) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_READONLY_MEM) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQFD_RESAMPLE) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VM_ATTRIBUTES) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_GUEST_DEBUG) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_GUEST_DEBUG2) = > > > 2031619 > > > [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bd0040) = 0 > > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bcff10) = 0 > > > [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bcffa0) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XCRS) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SREGS2) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV_VP_INDEX) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_EXCEPTION_PAYLOAD) = 1 > > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, > > > KVM_CAP_X86_TRIPLE_FAULT_EVENT) = 1 > > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0 > > > [pid 53235] ioctl(12, KVM_GET_MSR_INDEX_LIST, 0x7ffdb6bd00f0) = -1 > > > E2BIG (Argument list too long) > > > [pid 53235] ioctl(12, KVM_GET_MSR_INDEX_LIST, 0x55d227634b40) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_MSR_FEATURES) = 1 > > > [pid 53235] ioctl(12, KVM_GET_MSR_FEATURE_INDEX_LIST, 0x7ffdb6bd00f0) > > > = -1 E2BIG (Argument list too long) > > > [pid 53235] ioctl(12, KVM_GET_MSR_FEATURE_INDEX_LIST, 0x55d2273a3ef0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_IDENTITY_MAP_ADDR, 0x7ffdb6bd00e0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_TSS_ADDR, 0xfeffd000) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_SMM) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_NOTIFY_VMEXIT) = 0 > > > [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_X86_USER_SPACE_MSR) = 1 > > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0 > > > [pid 53235] ioctl(13, KVM_X86_SET_MSR_FILTER, 0x7ffdb6bcff30) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQCHIP) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQFD) = 1 > > > [pid 53235] ioctl(13, KVM_CREATE_IRQCHIP, 0) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096 > > > [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_SYNC_MMU) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_BINARY_STATS_FD) = 1 > > > [pid 53235] ioctl(13, KVM_CREATE_GUEST_MEMFD, 0x7ffdb6bd0080) = 16 > > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd0210) = 0 > > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725920) = -1 > > > E2BIG (Argument list too long) > > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725960) = -1 > > > E2BIG (Argument list too long) > > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725a40) = -1 > > > E2BIG (Argument list too long) > > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725a40) = -1 > > > E2BIG (Argument list too long) > > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725b90) = -1 > > > E2BIG (Argument list too long) > > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725e20) = -1 > > > E2BIG (Argument list too long) > > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, {nent=61, entries=[...]}) > > > = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1 > > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1 > > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0 > > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1 > > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1 > > > [pid 53239] ioctl(13, KVM_CREATE_VCPU, 0) = 17 > > > [pid 53239] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288 > > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096 > > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1 > > > [pid 53239] ioctl(17, KVM_GET_TSC_KHZ, 0) = 2000000 > > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32 > > > [pid 53239] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f856d5fa578) = 0 > > > [pid 53239] ioctl(17, KVM_X86_SETUP_MCE, 0x55d227724b38) = 0 > > > [pid 53239] ioctl(17, KVM_SET_CPUID2, {nent=29, entries=[...]}) = 0 > > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 2 > > > [pid 53239] ioctl(17, KVM_GET_STATS_FD, 0) = 18 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1 > > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1 > > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0 > > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1 > > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1 > > > [pid 53240] ioctl(13, KVM_CREATE_VCPU, 1) = 19 > > > [pid 53240] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288 > > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096 > > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1 > > > [pid 53240] ioctl(19, KVM_GET_TSC_KHZ, 0) = 2000000 > > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32 > > > [pid 53240] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f856cbfa578) = 0 > > > [pid 53240] ioctl(19, KVM_X86_SETUP_MCE, 0x55d227757e48) = 0 > > > [pid 53240] ioctl(19, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0 > > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 2 > > > [pid 53240] ioctl(19, KVM_GET_STATS_FD, 0) = 20 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING > > > <unfinished ...> > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1 > > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1 > > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0 > > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1 > > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1 > > > [pid 53241] ioctl(13, KVM_CREATE_VCPU, 2) = 21 > > > [pid 53241] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288 > > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096 > > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1 > > > [pid 53241] ioctl(21, KVM_GET_TSC_KHZ, 0) = 2000000 > > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32 > > > [pid 53241] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f84e7bfa578) = 0 > > > [pid 53241] ioctl(21, KVM_X86_SETUP_MCE, 0x55d227761e18) = 0 > > > [pid 53241] ioctl(21, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0 > > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 2 > > > [pid 53241] ioctl(21, KVM_GET_STATS_FD, 0) = 22 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1 > > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1 > > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0 > > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1 > > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1 > > > [pid 53242] ioctl(13, KVM_CREATE_VCPU, 3) = 23 > > > [pid 53242] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288 > > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096 > > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1 > > > [pid 53242] ioctl(23, KVM_GET_TSC_KHZ, 0) = 2000000 > > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1 > > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32 > > > [pid 53242] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f84e71fa578) = 0 > > > [pid 53242] ioctl(23, KVM_X86_SETUP_MCE, 0x55d22776bd18) = 0 > > > [pid 53242] ioctl(23, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0 > > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 2 > > > [pid 53242] ioctl(23, KVM_GET_STATS_FD, 0) = 24 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING > > > <unfinished ...> > > > [pid 53235] ioctl(13, KVM_GET_CLOCK, 0x7ffdb6bcfff0) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_ADJUST_CLOCK) = 14 > > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd00c0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bd0150 > > > <unfinished ...> > > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd0050) = 0 > > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd0050) = 0 > > > [pid 53235] ioctl(13, KVM_CREATE_GUEST_MEMFD, 0x7ffdb6bd0050) = 10 > > > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcffa0) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096 > > > [pid 53235] ioctl(13, KVM_SET_GSI_ROUTING, 0x55d227bbb830) = 0 > > > [pid 53235] ioctl(13, KVM_UNREGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0 > > > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0 > > > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0 > > > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfcd0) = 0 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_PIT_STATE2) = 1 > > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_PIT2) = 1 > > > [pid 53235] ioctl(13, KVM_CREATE_PIT2, 0x7ffdb6bd0040) = 0 > > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe40) = 0 > > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe90) = 0 > > > [pid 53239] ioctl(17, KVM_SET_SREGS2, 0x7f856d5fb340 <unfinished ...> > > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1 > > > [pid 53239] ioctl(17, KVM_GET_TSC_KHZ, 0) = 2000000 > > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1 > > > [pid 53239] ioctl(17, KVM_SET_TSC_KHZ, 0x1e8480) = 0 > > > [pid 53239] ioctl(17, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xfff0, rflags=0x2}) = 0 > > > [pid 53239] ioctl(17, KVM_SET_XSAVE, 0x7f84e0001000) = 0 > > > [pid 53239] ioctl(17, KVM_SET_XCRS, 0x7f856d5fb310) = 0 > > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 109 > > > [pid 53239] ioctl(17, KVM_SET_VCPU_EVENTS, 0x7f856d5fb550) = 0 > > > [pid 53239] ioctl(17, KVM_SET_MP_STATE, 0x7f856d5fb4c0) = 0 > > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1 > > > [pid 53239] ioctl(17, KVM_SET_DEBUGREGS, 0x7f856d5fb550) = 0 > > > [pid 53240] ioctl(19, KVM_SET_SREGS2, 0x7f856cbfb340 <unfinished ...> > > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1 > > > [pid 53240] ioctl(19, KVM_GET_TSC_KHZ, 0) = 2000000 > > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1 > > > [pid 53240] ioctl(19, KVM_SET_TSC_KHZ, 0x1e8480) = 0 > > > [pid 53240] ioctl(19, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xb004, rflags=0x2}) = 0 > > > [pid 53240] ioctl(19, KVM_SET_XSAVE, 0x7f84d8001000) = 0 > > > [pid 53240] ioctl(19, KVM_SET_XCRS, 0x7f856cbfb310) = 0 > > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 109 > > > [pid 53240] ioctl(19, KVM_SET_VCPU_EVENTS, 0x7f856cbfb550) = 0 > > > [pid 53240] ioctl(19, KVM_SET_MP_STATE, 0x7f856cbfb4c0) = 0 > > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1 > > > [pid 53240] ioctl(19, KVM_SET_DEBUGREGS, 0x7f856cbfb550) = 0 > > > [pid 53241] ioctl(21, KVM_SET_SREGS2, 0x7f84e7bfb340 <unfinished ...> > > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1 > > > [pid 53241] ioctl(21, KVM_GET_TSC_KHZ, 0) = 2000000 > > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1 > > > [pid 53241] ioctl(21, KVM_SET_TSC_KHZ, 0x1e8480) = 0 > > > [pid 53241] ioctl(21, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xb004, rflags=0x2}) = 0 > > > [pid 53241] ioctl(21, KVM_SET_XSAVE, 0x7f84d4001000) = 0 > > > [pid 53241] ioctl(21, KVM_SET_XCRS, 0x7f84e7bfb310) = 0 > > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 109 > > > [pid 53241] ioctl(21, KVM_SET_VCPU_EVENTS, 0x7f84e7bfb550) = 0 > > > [pid 53241] ioctl(21, KVM_SET_MP_STATE, 0x7f84e7bfb4c0) = 0 > > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1 > > > [pid 53241] ioctl(21, KVM_SET_DEBUGREGS, 0x7f84e7bfb550) = 0 > > > [pid 53242] ioctl(23, KVM_SET_SREGS2, 0x7f84e71fb340) = 0 > > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1 > > > [pid 53242] ioctl(23, KVM_GET_TSC_KHZ, 0) = 2000000 > > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1 > > > [pid 53242] ioctl(23, KVM_SET_TSC_KHZ, 0x1e8480) = 0 > > > [pid 53242] ioctl(23, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xb004, rflags=0x2}) = 0 > > > [pid 53242] ioctl(23, KVM_SET_XSAVE, 0x7f84cc001000) = 0 > > > [pid 53242] ioctl(23, KVM_SET_XCRS, 0x7f84e71fb310) = 0 > > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 109 > > > [pid 53242] ioctl(23, KVM_SET_VCPU_EVENTS, 0x7f84e71fb550) = 0 > > > [pid 53242] ioctl(23, KVM_SET_MP_STATE, 0x7f84e71fb4c0) = 0 > > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1 > > > [pid 53242] ioctl(23, KVM_SET_DEBUGREGS, 0x7f84e71fb550) = 0 > > > [pid 53239] ioctl(17, KVM_GET_VCPU_EVENTS, 0x7f856d5fb550) = 0 > > > [pid 53239] ioctl(17, KVM_GET_MP_STATE, 0x7f856d5fb4c0) = 0 > > > [pid 53239] ioctl(17, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xfff0, rflags=0x2}) = 0 > > > [pid 53239] ioctl(17, KVM_GET_XSAVE2, 0x7f84e0001000) = 0 > > > [pid 53239] ioctl(17, KVM_GET_XCRS, 0x7f856d5fb320) = 0 > > > [pid 53239] ioctl(17, KVM_GET_SREGS2, 0x7f856d5fb350) = 0 > > > [pid 53239] ioctl(17, KVM_GET_MSRS, 0x7f84e0002010) = 110 > > > [pid 53239] ioctl(17, KVM_GET_LAPIC, 0x7f856d5fb090) = 0 > > > [pid 53239] ioctl(17, KVM_GET_DEBUGREGS, 0x7f856d5fb550) = 0 > > > [pid 53240] ioctl(19, KVM_GET_VCPU_EVENTS, 0x7f856cbfb550) = 0 > > > [pid 53240] ioctl(19, KVM_GET_MP_STATE, 0x7f856cbfb4c0) = 0 > > > [pid 53240] ioctl(19, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xb004, rflags=0x2}) = 0 > > > [pid 53240] ioctl(19, KVM_GET_XSAVE2, 0x7f84d8001000) = 0 > > > [pid 53240] ioctl(19, KVM_GET_XCRS, 0x7f856cbfb320) = 0 > > > [pid 53240] ioctl(19, KVM_GET_SREGS2, 0x7f856cbfb350) = 0 > > > [pid 53240] ioctl(19, KVM_GET_MSRS, 0x7f84d8002010) = 110 > > > [pid 53240] ioctl(19, KVM_GET_LAPIC, 0x7f856cbfb090) = 0 > > > [pid 53240] ioctl(19, KVM_GET_DEBUGREGS, 0x7f856cbfb550) = 0 > > > [pid 53241] ioctl(21, KVM_GET_VCPU_EVENTS, 0x7f84e7bfb550) = 0 > > > [pid 53241] ioctl(21, KVM_GET_MP_STATE, 0x7f84e7bfb4c0) = 0 > > > [pid 53241] ioctl(21, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xb004, rflags=0x2}) = 0 > > > [pid 53241] ioctl(21, KVM_GET_XSAVE2, 0x7f84d4001000) = 0 > > > [pid 53241] ioctl(21, KVM_GET_XCRS, 0x7f84e7bfb320) = 0 > > > [pid 53241] ioctl(21, KVM_GET_SREGS2, 0x7f84e7bfb350) = 0 > > > [pid 53241] ioctl(21, KVM_GET_MSRS, 0x7f84d4002010) = 110 > > > [pid 53241] ioctl(21, KVM_GET_LAPIC, 0x7f84e7bfb090) = 0 > > > [pid 53241] ioctl(21, KVM_GET_DEBUGREGS, 0x7f84e7bfb550) = 0 > > > [pid 53242] ioctl(23, KVM_GET_VCPU_EVENTS, 0x7f84e71fb550) = 0 > > > [pid 53242] ioctl(23, KVM_GET_MP_STATE, 0x7f84e71fb4c0) = 0 > > > [pid 53242] ioctl(23, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xb004, rflags=0x2}) = 0 > > > [pid 53242] ioctl(23, KVM_GET_XSAVE2, 0x7f84cc001000) = 0 > > > [pid 53242] ioctl(23, KVM_GET_XCRS, 0x7f84e71fb320) = 0 > > > [pid 53242] ioctl(23, KVM_GET_SREGS2, 0x7f84e71fb350) = 0 > > > [pid 53242] ioctl(23, KVM_GET_MSRS, 0x7f84cc002010) = 110 > > > [pid 53242] ioctl(23, KVM_GET_LAPIC, 0x7f84e71fb090) = 0 > > > [pid 53242] ioctl(23, KVM_GET_DEBUGREGS, 0x7f84e71fb550) = 0 > > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bd01d0) = 0 > > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bd0220) = 0 > > > [pid 53235] ioctl(13, KVM_GET_PIT2, 0x7ffdb6bd00b0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_PIT2, 0x7ffdb6bd00d0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcffa0) = 0 > > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe40) = 0 > > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe90) = 0 > > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe60) = 0 > > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfeb0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_PIT2, 0x7ffdb6bcfe50) = 0 > > > [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcfce0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcfce0) = 0 > > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe70) = 0 > > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfec0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0 > > > <unfinished ...> > > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0 > > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0 > > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0 > > > [pid 53239] ioctl(17, KVM_TPR_ACCESS_REPORTING, 0x7f856d5fb5f0) = 0 > > > [pid 53240] ioctl(19, KVM_TPR_ACCESS_REPORTING, 0x7f856cbfb5f0 > > > <unfinished ...> > > > [pid 53241] ioctl(21, KVM_TPR_ACCESS_REPORTING, 0x7f84e7bfb5f0) = 0 > > > [pid 53242] ioctl(23, KVM_TPR_ACCESS_REPORTING, 0x7f84e71fb5f0) = 0 > > > [pid 53235] ioctl(17, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0) = 0 > > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1 > > > [pid 53239] ioctl(17, KVM_SET_LAPIC, 0x7f856d5fb200) = 0 > > > [pid 53235] ioctl(19, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...> > > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1 > > > [pid 53240] ioctl(19, KVM_SET_LAPIC, 0x7f856cbfb200) = 0 > > > [pid 53235] ioctl(21, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...> > > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1 > > > [pid 53241] ioctl(21, KVM_SET_LAPIC, 0x7f84e7bfb200) = 0 > > > [pid 53235] ioctl(23, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...> > > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1 > > > [pid 53242] ioctl(23, KVM_SET_LAPIC, 0x7f84e71fb200) = 0 > > > [pid 53239] ioctl(17, KVM_SET_SREGS2, 0x7f856d5fb340) = 0 > > > [pid 53239] ioctl(17, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xfff0, rflags=0x2}) = 0 > > > [pid 53239] ioctl(17, KVM_SET_XSAVE, 0x7f84e0001000) = 0 > > > [pid 53239] ioctl(17, KVM_SET_XCRS, 0x7f856d5fb310) = 0 > > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 109 > > > [pid 53239] ioctl(17, KVM_SET_VCPU_EVENTS, 0x7f856d5fb550) = 0 > > > [pid 53239] ioctl(17, KVM_SET_MP_STATE, 0x7f856d5fb4c0) = 0 > > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1 > > > [pid 53239] ioctl(17, KVM_SET_DEBUGREGS, 0x7f856d5fb550) = 0 > > > [pid 53240] ioctl(19, KVM_SET_SREGS2, 0x7f856cbfb340) = 0 > > > [pid 53240] ioctl(19, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xb004, rflags=0x2}) = 0 > > > [pid 53240] ioctl(19, KVM_SET_XSAVE, 0x7f84d8001000) = 0 > > > [pid 53240] ioctl(19, KVM_SET_XCRS, 0x7f856cbfb310) = 0 > > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 109 > > > [pid 53240] ioctl(19, KVM_SET_VCPU_EVENTS, 0x7f856cbfb550) = 0 > > > [pid 53240] ioctl(19, KVM_SET_MP_STATE, 0x7f856cbfb4c0) = 0 > > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1 > > > [pid 53240] ioctl(19, KVM_SET_DEBUGREGS, 0x7f856cbfb550) = 0 > > > [pid 53241] ioctl(21, KVM_SET_SREGS2, 0x7f84e7bfb340) = 0 > > > [pid 53241] ioctl(21, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xb004, rflags=0x2}) = 0 > > > [pid 53241] ioctl(21, KVM_SET_XSAVE, 0x7f84d4001000) = 0 > > > [pid 53241] ioctl(21, KVM_SET_XCRS, 0x7f84e7bfb310) = 0 > > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 109 > > > [pid 53241] ioctl(21, KVM_SET_VCPU_EVENTS, 0x7f84e7bfb550) = 0 > > > [pid 53241] ioctl(21, KVM_SET_MP_STATE, 0x7f84e7bfb4c0) = 0 > > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1 > > > [pid 53241] ioctl(21, KVM_SET_DEBUGREGS, 0x7f84e7bfb550) = 0 > > > [pid 53242] ioctl(23, KVM_SET_SREGS2, 0x7f84e71fb340) = 0 > > > [pid 53242] ioctl(23, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ..., > > > rip=0xb004, rflags=0x2}) = 0 > > > [pid 53242] ioctl(23, KVM_SET_XSAVE, 0x7f84cc001000) = 0 > > > [pid 53242] ioctl(23, KVM_SET_XCRS, 0x7f84e71fb310) = 0 > > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 109 > > > [pid 53242] ioctl(23, KVM_SET_VCPU_EVENTS, 0x7f84e71fb550) = 0 > > > [pid 53242] ioctl(23, KVM_SET_MP_STATE, 0x7f84e71fb4c0) = 0 > > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1 > > > [pid 53242] ioctl(23, KVM_SET_DEBUGREGS, 0x7f84e71fb550) = 0 > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0 <unfinished ...> > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG > > > (Argument list too long) > > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = 0 > > > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcf640) = 0 > > > [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bcf6d0) = -1 > > > EINVAL (Invalid argument) > > > > > > On Mon, Aug 5, 2024 at 4:51 PM Roth, Michael <michael.r...@amd.com> wrote: > > > > > > > > [AMD Official Use Only - AMD Internal Distribution Only] > > > > > > > > > -----Original Message----- > > > > > From: Paolo Bonzini <pbonz...@redhat.com> > > > > > Sent: Monday, August 5, 2024 8:36 AM > > > > > To: Arvid Picciani <arvid@kraud.cloud> > > > > > Cc: Roth, Michael <michael.r...@amd.com>; qemu-discuss@nongnu.org > > > > > Subject: Re: SNP: qemu upstream vs AMD fork on kernel 6.11 > > > > > > > > > > On Mon, Aug 5, 2024 at 3:26 PM Arvid Picciani <arvid@kraud.cloud> > > > > > wrote: > > > > > > > > > > > > Hi, > > > > > > > > > > > > with linux 6.11 it looks like kvm SNP host api is finally there. > > > > > > > > > > > > However, current qemu upstream appears to be tested against a much > > > > > > older kernel by redhat (according to the libvirt IRC its via coconut > > > > > > svsm), > > > > > > > > > > It's tested against both 6.11 (actually a slightly older branch in > > > > > kvm.git) and the CentOS Stream 9 kernel. The CentOS Stream 9 kernel > > > > > has the same SNP code as Linux 6.11. > > > > > > > > > > > while the current head of the amd fork on github works just > > > > > > fine with 6.11. > > > > > > > > > > The current head of the AMD fork (https://github.com/AMDESE/qemu > > > > > snp-latest) is not in line with the upstream kernel, for example: > > > > > > > > > > 66e7fbadfc8 i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State > > > > > Changes > > > > > e9898385037 i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State > > > > > Changes (MSR-based) > > > > > > > > It actually adds the KVM_HC_MAP_GPA_RANGE handling on top, and then > > > > drops all KVM_EXIT_VMGEXIT handling completely as part of: > > > > > > > > commit 62434c7dd57fcf2e02f6765b9d0d2588b5e032d3 > > > > Author: Michael Roth <michael.r...@amd.com> > > > > Date: Wed May 1 01:14:39 2024 -0500 > > > > > > > > *i386/sev: Rework GHCB extended guest request handling > > > > > > > > TODO: drop the PSC patches completely so this rework can become a > > > > clean > > > > standalone patch. > > > > > > > > The v4 patches that actually went into QEMU 9.1 have this changeset > > > > appropriately split/squashed into their proper place, but I think the > > > > upstream behavior should be about the same as what is in snp-latest > > > > QEMU tree currently. > > > > > > > > If snp-latest works, but upstream QEMU does not, then there is > > > > potentially a regression upstream. However I just re-tested latest QEMU > > > > commit (f9851d2ffef5) against upstream KVM and didn't see any issue. > > > > > > > > QEMU 9.1 is already is hard-freeze, so if there is a confirmed breakage > > > > please share the full details and steps to reproduce so it can > > > > hopefully be sorted before the 9.1 release. > > > > > > > > -Mike > > > > > > > > > > > > > > What problems are you seeing with Linux 6.11? > > > > > > > > > > Paolo > > > > > > > > > > > there's also this old patch missing to enable virtiofsd > > > > > > https://lists.gnu.org/archive/html/qemu-devel/2022-01/msg03456.html > > > > > > > > > > > > i would rebase that and send it again, but current main is broken on > > > > > > 6.11, so wondering where qemu is heading. > > > > > > > > > > > > thanks > > > > > > > > > > > > > > > > > > > > > > > > -- > > > > > > https://kraudcloud.com/ > > > > > > devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani > > > > > > Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B > > > > > > > > > > > > > > > > > > > -- > > > https://kraudcloud.com/ > > > devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani > > > Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B > > > > -- > https://kraudcloud.com/ > devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani > Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B