On Mon, Aug 05, 2024 at 07:55:23PM +0200, Arvid Picciani wrote:
> that was it, thanks a ton!
> 
> i got confused because -bios with OVMF_CODE.fd said "qemu: could not
> load PC BIOS".
> but i only realized i'm using the wrong image after you wrote that.
> 
> 
> works now with upstream kernel, qemu and ovmf. thanks so much for
> getting this thing upstream.

Glad you got it working! Thanks for testing :)

-Mike

> 
> On Mon, Aug 5, 2024 at 7:42 PM Michael Roth <michael.r...@amd.com> wrote:
> >
> > On Mon, Aug 05, 2024 at 07:07:36PM +0200, Arvid Picciani wrote:
> > > thanks all, it must be my call args then i guess.
> > >
> > > with f9851d2ffef5 ovmf has to be loaded with
> > >
> > > -drive 
> > > if=pflash,format=raw,unit=0,file=/AMDSEV/usr/local/share/qemu/OVMF_CODE.fd
> > > -drive if=pflash,format=raw,unit=1,file=/AMDSEV/null.fd
> >
> > This is actually the old way SNP expected the BIOS to be loaded. Upstream
> > QEMU expects one to use -bios.
> >
> > It may be possible that if=pflash just happens to not immediately fail for
> > you, but that's no longer the supported method and you may be getting some
> > sort of unexpected behavior because of it.
> >
> > >
> > > while the amd fork only accepts it via -bios
> >
> > The only difference I'm aware of with snp-latest branch is that it
> > allows you to continue to specify:
> >
> >   -drive if=pflash,format=raw,unit=1,file=/AMDSEV/null.fd
> >
> > for the OVMF VARS image if you built with split OVMF CODE/VARS images. But
> > with upstream QEMU only the single-image OVMF is supported (via -bios).
> >
> > >
> > > thats the only thing i changed from the AMD reference launch.sh.
> > > i get the dreaded "SNP_LAUNCH_UPDATE ret=-22 fw_error=0 '' with
> >
> > Yah, I try to use -drive if=pflash to specify OVMF BIOS like you are
> > doing above with f9851d2ffef5, then I get the same error. It's not
> > the most graceful failure path, but I'd consider it expected since you
> > are providing a BIOS in the expected manner which could certainly cause
> > a failure during SNP_LAUNCH_UPDATE's attempts to measure/encrypt it.
> >
> > So try switch to non-split OVMF image and using -bios to specify it and
> > it seems likely that would avoid the error.
> >
> > -Mike
> >
> > > upstream qemu, which in the past indicated a mismatch between host
> > > kernel and qemu api.
> > >
> > > from strace, i'm assuming something with memory changed, since
> > > KVM_MEMORY_ENCRYPT_OP fails,
> > > but the  documentation for how memory backend works is missing in
> > > qemu/docs/system/i386/amd-memory-encryption.rst or its automatic now?
> > >
> > > here's the full args and strace
> > >
> > > /root/qemu/build/qemu-bundle/usr/bin/qemu-system-x86_64 \
> > > -enable-kvm -cpu EPYC-v4 -machine q35 -smp 4,maxcpus=255 -m
> > > 2048M,slots=5,maxmem=10240M -no-reboot -drive
> > > if=pflash,format=raw,unit=0,file=/AMDSEV/usr/local/share/qemu/OVMF_CODE.fd
> > > -drive 
> > > if=pflash,format=raw,unit=1,file=/AMDSEV/debian-12-genericcloud-amd64-20240717-1811.fd
> > > -netdev user,id=vmnic  -device
> > > virtio-net-pci,disable-legacy=on,iommu_platform=true,netdev=vmnic,romfile=
> > > -drive 
> > > file=/root/debian-12-genericcloud-amd64-20240717-1811.raw,if=none,id=disk0,format=raw
> > > -device virtio-scsi-pci,id=scsi0,disable-legacy=on,iommu_platform=true
> > > -device scsi-hd,drive=disk0 -machine memory-encryption=sev0,vmport=off
> > > -object memory-backend-memfd,id=ram1,size=2048M,share=true,prealloc=false
> > > -machine memory-backend=ram1 -object
> > > sev-snp-guest,id=sev0,policy=0xb0000,cbitpos=51,reduced-phys-bits=1
> > > -nographic -monitor pty -monitor unix:monitor,server,nowait  -device
> > > virtio-serial-pci
> > >
> > >
> > >
> > >
> > > root@localhost:~# sh q.sh 2>&1 | grep KVM
> > > [pid 53235] ioctl(12, KVM_GET_API_VERSION, 0) = 12
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MEMORY_ATTRIBUTES) = 8
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GUEST_MEMFD) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_USER_MEMORY2) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IMMEDIATE_EXIT) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_NR_MEMSLOTS) = 32764
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MULTI_ADDRESS_SPACE) = 
> > > 2
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VM_TYPES) = 31
> > > [pid 53235] ioctl(12, KVM_CREATE_VM, 0x4 <unfinished ...>
> > > [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS) = 128
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MAX_VCPUS) = 4096
> > > [pid 53235] write(2, "Number of hotpluggable cpus requ"..., 95Number
> > > of hotpluggable cpus requested (255) exceeds the recommended cpus
> > > supported by KVM (128)) = 95
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_USER_MEMORY) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
> > > KVM_CAP_DESTROY_MEMORY_REGION_WORKS) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
> > > KVM_CAP_JOIN_MEMORY_REGIONS_WORKS) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_INTERNAL_ERROR_DATA) = 
> > > 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IOEVENTFD) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IOEVENTFD_ANY_LENGTH) 
> > > = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_TSS_ADDR) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_EXT_CPUID) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MP_STATE) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SIGNAL_MSI) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_DEBUGREGS) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VCPU_EVENTS) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_ROBUST_SINGLESTEP) 
> > > = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_ADJUST_CLOCK) = 14
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_IDENTITY_MAP_ADDR) 
> > > = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_COALESCED_MMIO) = 2
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_COALESCED_PIO) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
> > > KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2) = 3
> > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd0370) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VCPU_EVENTS) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_NESTED_STATE) = 4224
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_INJECT_STATUS) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_READONLY_MEM) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQFD_RESAMPLE) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VM_ATTRIBUTES) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_GUEST_DEBUG) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_GUEST_DEBUG2) = 
> > > 2031619
> > > [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bd0040) = 0
> > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bcff10) = 0
> > > [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bcffa0) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XCRS) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SREGS2) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV_VP_INDEX) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_EXCEPTION_PAYLOAD) = 1
> > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, 
> > > KVM_CAP_X86_TRIPLE_FAULT_EVENT) = 1
> > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
> > > [pid 53235] ioctl(12, KVM_GET_MSR_INDEX_LIST, 0x7ffdb6bd00f0) = -1
> > > E2BIG (Argument list too long)
> > > [pid 53235] ioctl(12, KVM_GET_MSR_INDEX_LIST, 0x55d227634b40) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_MSR_FEATURES) = 1
> > > [pid 53235] ioctl(12, KVM_GET_MSR_FEATURE_INDEX_LIST, 0x7ffdb6bd00f0)
> > > = -1 E2BIG (Argument list too long)
> > > [pid 53235] ioctl(12, KVM_GET_MSR_FEATURE_INDEX_LIST, 0x55d2273a3ef0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_IDENTITY_MAP_ADDR, 0x7ffdb6bd00e0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_TSS_ADDR, 0xfeffd000) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_SMM) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_NOTIFY_VMEXIT) = 0
> > > [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_X86_USER_SPACE_MSR) = 1
> > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
> > > [pid 53235] ioctl(13, KVM_X86_SET_MSR_FILTER, 0x7ffdb6bcff30) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQCHIP) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQFD) = 1
> > > [pid 53235] ioctl(13, KVM_CREATE_IRQCHIP, 0) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> > > [pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_SYNC_MMU) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_BINARY_STATS_FD) = 1
> > > [pid 53235] ioctl(13, KVM_CREATE_GUEST_MEMFD, 0x7ffdb6bd0080) = 16
> > > [pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd0210) = 0
> > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725920) = -1
> > > E2BIG (Argument list too long)
> > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725960) = -1
> > > E2BIG (Argument list too long)
> > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725a40) = -1
> > > E2BIG (Argument list too long)
> > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725a40) = -1
> > > E2BIG (Argument list too long)
> > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725b90) = -1
> > > E2BIG (Argument list too long)
> > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725e20) = -1
> > > E2BIG (Argument list too long)
> > > [pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, {nent=61, entries=[...]}) 
> > > = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > > [pid 53239] ioctl(13, KVM_CREATE_VCPU, 0) = 17
> > > [pid 53239] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > > [pid 53239] ioctl(17, KVM_GET_TSC_KHZ, 0) = 2000000
> > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> > > [pid 53239] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f856d5fa578) = 0
> > > [pid 53239] ioctl(17, KVM_X86_SETUP_MCE, 0x55d227724b38) = 0
> > > [pid 53239] ioctl(17, KVM_SET_CPUID2, {nent=29, entries=[...]}) = 0
> > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 2
> > > [pid 53239] ioctl(17, KVM_GET_STATS_FD, 0) = 18
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > > [pid 53240] ioctl(13, KVM_CREATE_VCPU, 1) = 19
> > > [pid 53240] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > > [pid 53240] ioctl(19, KVM_GET_TSC_KHZ, 0) = 2000000
> > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> > > [pid 53240] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f856cbfa578) = 0
> > > [pid 53240] ioctl(19, KVM_X86_SETUP_MCE, 0x55d227757e48) = 0
> > > [pid 53240] ioctl(19, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
> > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 2
> > > [pid 53240] ioctl(19, KVM_GET_STATS_FD, 0) = 20
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING 
> > > <unfinished ...>
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > > [pid 53241] ioctl(13, KVM_CREATE_VCPU, 2) = 21
> > > [pid 53241] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > > [pid 53241] ioctl(21, KVM_GET_TSC_KHZ, 0) = 2000000
> > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> > > [pid 53241] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f84e7bfa578) = 0
> > > [pid 53241] ioctl(21, KVM_X86_SETUP_MCE, 0x55d227761e18) = 0
> > > [pid 53241] ioctl(21, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
> > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 2
> > > [pid 53241] ioctl(21, KVM_GET_STATS_FD, 0) = 22
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
> > > [pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
> > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > > [pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
> > > [pid 53242] ioctl(13, KVM_CREATE_VCPU, 3) = 23
> > > [pid 53242] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
> > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
> > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > > [pid 53242] ioctl(23, KVM_GET_TSC_KHZ, 0) = 2000000
> > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
> > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
> > > [pid 53242] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f84e71fa578) = 0
> > > [pid 53242] ioctl(23, KVM_X86_SETUP_MCE, 0x55d22776bd18) = 0
> > > [pid 53242] ioctl(23, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
> > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 2
> > > [pid 53242] ioctl(23, KVM_GET_STATS_FD, 0) = 24
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING 
> > > <unfinished ...>
> > > [pid 53235] ioctl(13, KVM_GET_CLOCK, 0x7ffdb6bcfff0) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_ADJUST_CLOCK) = 14
> > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd00c0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bd0150 
> > > <unfinished ...>
> > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd0050) = 0
> > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd0050) = 0
> > > [pid 53235] ioctl(13, KVM_CREATE_GUEST_MEMFD, 0x7ffdb6bd0050) = 10
> > > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcffa0) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
> > > [pid 53235] ioctl(13, KVM_SET_GSI_ROUTING, 0x55d227bbb830) = 0
> > > [pid 53235] ioctl(13, KVM_UNREGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
> > > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
> > > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
> > > [pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfcd0) = 0
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_PIT_STATE2) = 1
> > > [pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_PIT2) = 1
> > > [pid 53235] ioctl(13, KVM_CREATE_PIT2, 0x7ffdb6bd0040) = 0
> > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe40) = 0
> > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe90) = 0
> > > [pid 53239] ioctl(17, KVM_SET_SREGS2, 0x7f856d5fb340 <unfinished ...>
> > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > > [pid 53239] ioctl(17, KVM_GET_TSC_KHZ, 0) = 2000000
> > > [pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> > > [pid 53239] ioctl(17, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> > > [pid 53239] ioctl(17, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xfff0, rflags=0x2}) = 0
> > > [pid 53239] ioctl(17, KVM_SET_XSAVE, 0x7f84e0001000) = 0
> > > [pid 53239] ioctl(17, KVM_SET_XCRS, 0x7f856d5fb310) = 0
> > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 109
> > > [pid 53239] ioctl(17, KVM_SET_VCPU_EVENTS, 0x7f856d5fb550) = 0
> > > [pid 53239] ioctl(17, KVM_SET_MP_STATE, 0x7f856d5fb4c0) = 0
> > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
> > > [pid 53239] ioctl(17, KVM_SET_DEBUGREGS, 0x7f856d5fb550) = 0
> > > [pid 53240] ioctl(19, KVM_SET_SREGS2, 0x7f856cbfb340 <unfinished ...>
> > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > > [pid 53240] ioctl(19, KVM_GET_TSC_KHZ, 0) = 2000000
> > > [pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> > > [pid 53240] ioctl(19, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> > > [pid 53240] ioctl(19, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xb004, rflags=0x2}) = 0
> > > [pid 53240] ioctl(19, KVM_SET_XSAVE, 0x7f84d8001000) = 0
> > > [pid 53240] ioctl(19, KVM_SET_XCRS, 0x7f856cbfb310) = 0
> > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 109
> > > [pid 53240] ioctl(19, KVM_SET_VCPU_EVENTS, 0x7f856cbfb550) = 0
> > > [pid 53240] ioctl(19, KVM_SET_MP_STATE, 0x7f856cbfb4c0) = 0
> > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
> > > [pid 53240] ioctl(19, KVM_SET_DEBUGREGS, 0x7f856cbfb550) = 0
> > > [pid 53241] ioctl(21, KVM_SET_SREGS2, 0x7f84e7bfb340 <unfinished ...>
> > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > > [pid 53241] ioctl(21, KVM_GET_TSC_KHZ, 0) = 2000000
> > > [pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> > > [pid 53241] ioctl(21, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> > > [pid 53241] ioctl(21, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xb004, rflags=0x2}) = 0
> > > [pid 53241] ioctl(21, KVM_SET_XSAVE, 0x7f84d4001000) = 0
> > > [pid 53241] ioctl(21, KVM_SET_XCRS, 0x7f84e7bfb310) = 0
> > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 109
> > > [pid 53241] ioctl(21, KVM_SET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
> > > [pid 53241] ioctl(21, KVM_SET_MP_STATE, 0x7f84e7bfb4c0) = 0
> > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
> > > [pid 53241] ioctl(21, KVM_SET_DEBUGREGS, 0x7f84e7bfb550) = 0
> > > [pid 53242] ioctl(23, KVM_SET_SREGS2, 0x7f84e71fb340) = 0
> > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
> > > [pid 53242] ioctl(23, KVM_GET_TSC_KHZ, 0) = 2000000
> > > [pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
> > > [pid 53242] ioctl(23, KVM_SET_TSC_KHZ, 0x1e8480) = 0
> > > [pid 53242] ioctl(23, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xb004, rflags=0x2}) = 0
> > > [pid 53242] ioctl(23, KVM_SET_XSAVE, 0x7f84cc001000) = 0
> > > [pid 53242] ioctl(23, KVM_SET_XCRS, 0x7f84e71fb310) = 0
> > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 109
> > > [pid 53242] ioctl(23, KVM_SET_VCPU_EVENTS, 0x7f84e71fb550) = 0
> > > [pid 53242] ioctl(23, KVM_SET_MP_STATE, 0x7f84e71fb4c0) = 0
> > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
> > > [pid 53242] ioctl(23, KVM_SET_DEBUGREGS, 0x7f84e71fb550) = 0
> > > [pid 53239] ioctl(17, KVM_GET_VCPU_EVENTS, 0x7f856d5fb550) = 0
> > > [pid 53239] ioctl(17, KVM_GET_MP_STATE, 0x7f856d5fb4c0) = 0
> > > [pid 53239] ioctl(17, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xfff0, rflags=0x2}) = 0
> > > [pid 53239] ioctl(17, KVM_GET_XSAVE2, 0x7f84e0001000) = 0
> > > [pid 53239] ioctl(17, KVM_GET_XCRS, 0x7f856d5fb320) = 0
> > > [pid 53239] ioctl(17, KVM_GET_SREGS2, 0x7f856d5fb350) = 0
> > > [pid 53239] ioctl(17, KVM_GET_MSRS, 0x7f84e0002010) = 110
> > > [pid 53239] ioctl(17, KVM_GET_LAPIC, 0x7f856d5fb090) = 0
> > > [pid 53239] ioctl(17, KVM_GET_DEBUGREGS, 0x7f856d5fb550) = 0
> > > [pid 53240] ioctl(19, KVM_GET_VCPU_EVENTS, 0x7f856cbfb550) = 0
> > > [pid 53240] ioctl(19, KVM_GET_MP_STATE, 0x7f856cbfb4c0) = 0
> > > [pid 53240] ioctl(19, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xb004, rflags=0x2}) = 0
> > > [pid 53240] ioctl(19, KVM_GET_XSAVE2, 0x7f84d8001000) = 0
> > > [pid 53240] ioctl(19, KVM_GET_XCRS, 0x7f856cbfb320) = 0
> > > [pid 53240] ioctl(19, KVM_GET_SREGS2, 0x7f856cbfb350) = 0
> > > [pid 53240] ioctl(19, KVM_GET_MSRS, 0x7f84d8002010) = 110
> > > [pid 53240] ioctl(19, KVM_GET_LAPIC, 0x7f856cbfb090) = 0
> > > [pid 53240] ioctl(19, KVM_GET_DEBUGREGS, 0x7f856cbfb550) = 0
> > > [pid 53241] ioctl(21, KVM_GET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
> > > [pid 53241] ioctl(21, KVM_GET_MP_STATE, 0x7f84e7bfb4c0) = 0
> > > [pid 53241] ioctl(21, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xb004, rflags=0x2}) = 0
> > > [pid 53241] ioctl(21, KVM_GET_XSAVE2, 0x7f84d4001000) = 0
> > > [pid 53241] ioctl(21, KVM_GET_XCRS, 0x7f84e7bfb320) = 0
> > > [pid 53241] ioctl(21, KVM_GET_SREGS2, 0x7f84e7bfb350) = 0
> > > [pid 53241] ioctl(21, KVM_GET_MSRS, 0x7f84d4002010) = 110
> > > [pid 53241] ioctl(21, KVM_GET_LAPIC, 0x7f84e7bfb090) = 0
> > > [pid 53241] ioctl(21, KVM_GET_DEBUGREGS, 0x7f84e7bfb550) = 0
> > > [pid 53242] ioctl(23, KVM_GET_VCPU_EVENTS, 0x7f84e71fb550) = 0
> > > [pid 53242] ioctl(23, KVM_GET_MP_STATE, 0x7f84e71fb4c0) = 0
> > > [pid 53242] ioctl(23, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xb004, rflags=0x2}) = 0
> > > [pid 53242] ioctl(23, KVM_GET_XSAVE2, 0x7f84cc001000) = 0
> > > [pid 53242] ioctl(23, KVM_GET_XCRS, 0x7f84e71fb320) = 0
> > > [pid 53242] ioctl(23, KVM_GET_SREGS2, 0x7f84e71fb350) = 0
> > > [pid 53242] ioctl(23, KVM_GET_MSRS, 0x7f84cc002010) = 110
> > > [pid 53242] ioctl(23, KVM_GET_LAPIC, 0x7f84e71fb090) = 0
> > > [pid 53242] ioctl(23, KVM_GET_DEBUGREGS, 0x7f84e71fb550) = 0
> > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bd01d0) = 0
> > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bd0220) = 0
> > > [pid 53235] ioctl(13, KVM_GET_PIT2, 0x7ffdb6bd00b0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_PIT2, 0x7ffdb6bd00d0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcffa0) = 0
> > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe40) = 0
> > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe90) = 0
> > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe60) = 0
> > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfeb0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_PIT2, 0x7ffdb6bcfe50) = 0
> > > [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcfce0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcfce0) = 0
> > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe70) = 0
> > > [pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfec0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0
> > > <unfinished ...>
> > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
> > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
> > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
> > > [pid 53239] ioctl(17, KVM_TPR_ACCESS_REPORTING, 0x7f856d5fb5f0) = 0
> > > [pid 53240] ioctl(19, KVM_TPR_ACCESS_REPORTING, 0x7f856cbfb5f0 
> > > <unfinished ...>
> > > [pid 53241] ioctl(21, KVM_TPR_ACCESS_REPORTING, 0x7f84e7bfb5f0) = 0
> > > [pid 53242] ioctl(23, KVM_TPR_ACCESS_REPORTING, 0x7f84e71fb5f0) = 0
> > > [pid 53235] ioctl(17, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0) = 0
> > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
> > > [pid 53239] ioctl(17, KVM_SET_LAPIC, 0x7f856d5fb200) = 0
> > > [pid 53235] ioctl(19, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
> > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
> > > [pid 53240] ioctl(19, KVM_SET_LAPIC, 0x7f856cbfb200) = 0
> > > [pid 53235] ioctl(21, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
> > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
> > > [pid 53241] ioctl(21, KVM_SET_LAPIC, 0x7f84e7bfb200) = 0
> > > [pid 53235] ioctl(23, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
> > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
> > > [pid 53242] ioctl(23, KVM_SET_LAPIC, 0x7f84e71fb200) = 0
> > > [pid 53239] ioctl(17, KVM_SET_SREGS2, 0x7f856d5fb340) = 0
> > > [pid 53239] ioctl(17, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xfff0, rflags=0x2}) = 0
> > > [pid 53239] ioctl(17, KVM_SET_XSAVE, 0x7f84e0001000) = 0
> > > [pid 53239] ioctl(17, KVM_SET_XCRS, 0x7f856d5fb310) = 0
> > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 109
> > > [pid 53239] ioctl(17, KVM_SET_VCPU_EVENTS, 0x7f856d5fb550) = 0
> > > [pid 53239] ioctl(17, KVM_SET_MP_STATE, 0x7f856d5fb4c0) = 0
> > > [pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
> > > [pid 53239] ioctl(17, KVM_SET_DEBUGREGS, 0x7f856d5fb550) = 0
> > > [pid 53240] ioctl(19, KVM_SET_SREGS2, 0x7f856cbfb340) = 0
> > > [pid 53240] ioctl(19, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xb004, rflags=0x2}) = 0
> > > [pid 53240] ioctl(19, KVM_SET_XSAVE, 0x7f84d8001000) = 0
> > > [pid 53240] ioctl(19, KVM_SET_XCRS, 0x7f856cbfb310) = 0
> > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 109
> > > [pid 53240] ioctl(19, KVM_SET_VCPU_EVENTS, 0x7f856cbfb550) = 0
> > > [pid 53240] ioctl(19, KVM_SET_MP_STATE, 0x7f856cbfb4c0) = 0
> > > [pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
> > > [pid 53240] ioctl(19, KVM_SET_DEBUGREGS, 0x7f856cbfb550) = 0
> > > [pid 53241] ioctl(21, KVM_SET_SREGS2, 0x7f84e7bfb340) = 0
> > > [pid 53241] ioctl(21, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xb004, rflags=0x2}) = 0
> > > [pid 53241] ioctl(21, KVM_SET_XSAVE, 0x7f84d4001000) = 0
> > > [pid 53241] ioctl(21, KVM_SET_XCRS, 0x7f84e7bfb310) = 0
> > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 109
> > > [pid 53241] ioctl(21, KVM_SET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
> > > [pid 53241] ioctl(21, KVM_SET_MP_STATE, 0x7f84e7bfb4c0) = 0
> > > [pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
> > > [pid 53241] ioctl(21, KVM_SET_DEBUGREGS, 0x7f84e7bfb550) = 0
> > > [pid 53242] ioctl(23, KVM_SET_SREGS2, 0x7f84e71fb340) = 0
> > > [pid 53242] ioctl(23, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
> > > rip=0xb004, rflags=0x2}) = 0
> > > [pid 53242] ioctl(23, KVM_SET_XSAVE, 0x7f84cc001000) = 0
> > > [pid 53242] ioctl(23, KVM_SET_XCRS, 0x7f84e71fb310) = 0
> > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 109
> > > [pid 53242] ioctl(23, KVM_SET_VCPU_EVENTS, 0x7f84e71fb550) = 0
> > > [pid 53242] ioctl(23, KVM_SET_MP_STATE, 0x7f84e71fb4c0) = 0
> > > [pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
> > > [pid 53242] ioctl(23, KVM_SET_DEBUGREGS, 0x7f84e71fb550) = 0
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0 <unfinished ...>
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
> > > (Argument list too long)
> > > [pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = 0
> > > [pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcf640) = 0
> > > [pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bcf6d0) = -1
> > > EINVAL (Invalid argument)
> > >
> > > On Mon, Aug 5, 2024 at 4:51 PM Roth, Michael <michael.r...@amd.com> wrote:
> > > >
> > > > [AMD Official Use Only - AMD Internal Distribution Only]
> > > >
> > > > > -----Original Message-----
> > > > > From: Paolo Bonzini <pbonz...@redhat.com>
> > > > > Sent: Monday, August 5, 2024 8:36 AM
> > > > > To: Arvid Picciani <arvid@kraud.cloud>
> > > > > Cc: Roth, Michael <michael.r...@amd.com>; qemu-discuss@nongnu.org
> > > > > Subject: Re: SNP: qemu upstream vs AMD fork on kernel 6.11
> > > > >
> > > > > On Mon, Aug 5, 2024 at 3:26 PM Arvid Picciani <arvid@kraud.cloud> 
> > > > > wrote:
> > > > > >
> > > > > > Hi,
> > > > > >
> > > > > > with linux 6.11 it looks like kvm SNP host api is finally there.
> > > > > >
> > > > > > However, current qemu upstream appears to be tested against a much
> > > > > > older kernel by redhat (according to the libvirt IRC its via coconut
> > > > > > svsm),
> > > > >
> > > > > It's tested against both 6.11 (actually a slightly older branch in
> > > > > kvm.git) and the CentOS Stream 9 kernel. The CentOS Stream 9 kernel
> > > > > has the same SNP code as Linux 6.11.
> > > > >
> > > > > > while the current head of the amd fork on github works just
> > > > > > fine with 6.11.
> > > > >
> > > > > The current head of the AMD fork (https://github.com/AMDESE/qemu
> > > > > snp-latest) is not in line with the upstream kernel, for example:
> > > > >
> > > > > 66e7fbadfc8 i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State 
> > > > > Changes
> > > > > e9898385037 i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State
> > > > > Changes (MSR-based)
> > > >
> > > > It actually adds the KVM_HC_MAP_GPA_RANGE handling on top, and then 
> > > > drops all KVM_EXIT_VMGEXIT handling completely as part of:
> > > >
> > > >   commit 62434c7dd57fcf2e02f6765b9d0d2588b5e032d3
> > > >   Author: Michael Roth <michael.r...@amd.com>
> > > >   Date:   Wed May 1 01:14:39 2024 -0500
> > > >
> > > >       *i386/sev: Rework GHCB extended guest request handling
> > > >
> > > >       TODO: drop the PSC patches completely so this rework can become a 
> > > > clean
> > > >       standalone patch.
> > > >
> > > > The v4 patches that actually went into QEMU 9.1 have this changeset 
> > > > appropriately split/squashed into their proper place, but I think the 
> > > > upstream behavior should be about the same as what is in snp-latest 
> > > > QEMU tree currently.
> > > >
> > > > If snp-latest works, but upstream QEMU does not, then there is 
> > > > potentially a regression upstream. However I just re-tested latest QEMU 
> > > > commit (f9851d2ffef5) against upstream KVM and didn't see any issue.
> > > >
> > > > QEMU 9.1 is already is hard-freeze, so if there is a confirmed breakage 
> > > > please share the full details and steps to reproduce so it can 
> > > > hopefully be sorted before the 9.1 release.
> > > >
> > > > -Mike
> > > >
> > > > >
> > > > > What problems are you seeing with Linux 6.11?
> > > > >
> > > > > Paolo
> > > > >
> > > > > > there's also this old patch missing to enable virtiofsd
> > > > > > https://lists.gnu.org/archive/html/qemu-devel/2022-01/msg03456.html
> > > > > >
> > > > > > i would rebase that and send it again, but current main is broken on
> > > > > > 6.11, so wondering where qemu is heading.
> > > > > >
> > > > > > thanks
> > > > > >
> > > > > >
> > > > > >
> > > > > > --
> > > > > > https://kraudcloud.com/
> > > > > > devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani
> > > > > > Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B
> > > > > >
> > > >
> > >
> > >
> > > --
> > > https://kraudcloud.com/
> > > devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani
> > > Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B
> 
> 
> 
> -- 
> https://kraudcloud.com/
> devguard GmbH, Berlin, Geschäftsführer: Arvid E Picciani
> Handelsregister: Amtsgericht Charlottenburg (Berlin) HRB 195184 B

Reply via email to