For the benefit of everyone besides the OP, please state explicitly:

- The preferred upstream way to load the UEFI bios into qemu-system .

- Where this stores the per-machine OVMF variables that could be
 changed from inside the guest OS and might be saved into free space
 in the BIOS flash chip on real hardware.

On 2024-08-05 20:03, Michael Roth wrote:
On Mon, Aug 05, 2024 at 07:55:23PM +0200, Arvid Picciani wrote:
that was it, thanks a ton!

i got confused because -bios with OVMF_CODE.fd said "qemu: could not
load PC BIOS".
but i only realized i'm using the wrong image after you wrote that.


works now with upstream kernel, qemu and ovmf. thanks so much for
getting this thing upstream.
Glad you got it working! Thanks for testing :)

-Mike

On Mon, Aug 5, 2024 at 7:42 PM Michael Roth <michael.r...@amd.com> wrote:
On Mon, Aug 05, 2024 at 07:07:36PM +0200, Arvid Picciani wrote:
thanks all, it must be my call args then i guess.

with f9851d2ffef5 ovmf has to be loaded with

-drive 
if=pflash,format=raw,unit=0,file=/AMDSEV/usr/local/share/qemu/OVMF_CODE.fd
-drive if=pflash,format=raw,unit=1,file=/AMDSEV/null.fd
This is actually the old way SNP expected the BIOS to be loaded. Upstream
QEMU expects one to use -bios.

It may be possible that if=pflash just happens to not immediately fail for
you, but that's no longer the supported method and you may be getting some
sort of unexpected behavior because of it.

while the amd fork only accepts it via -bios
The only difference I'm aware of with snp-latest branch is that it
allows you to continue to specify:

   -drive if=pflash,format=raw,unit=1,file=/AMDSEV/null.fd

for the OVMF VARS image if you built with split OVMF CODE/VARS images. But
with upstream QEMU only the single-image OVMF is supported (via -bios).

thats the only thing i changed from the AMD reference launch.sh.
i get the dreaded "SNP_LAUNCH_UPDATE ret=-22 fw_error=0 '' with
Yah, I try to use -drive if=pflash to specify OVMF BIOS like you are
doing above with f9851d2ffef5, then I get the same error. It's not
the most graceful failure path, but I'd consider it expected since you
are providing a BIOS in the expected manner which could certainly cause
a failure during SNP_LAUNCH_UPDATE's attempts to measure/encrypt it.

So try switch to non-split OVMF image and using -bios to specify it and
it seems likely that would avoid the error.

-Mike

upstream qemu, which in the past indicated a mismatch between host
kernel and qemu api.

from strace, i'm assuming something with memory changed, since
KVM_MEMORY_ENCRYPT_OP fails,
but the  documentation for how memory backend works is missing in
qemu/docs/system/i386/amd-memory-encryption.rst or its automatic now?

here's the full args and strace

/root/qemu/build/qemu-bundle/usr/bin/qemu-system-x86_64 \
-enable-kvm -cpu EPYC-v4 -machine q35 -smp 4,maxcpus=255 -m
2048M,slots=5,maxmem=10240M -no-reboot -drive
if=pflash,format=raw,unit=0,file=/AMDSEV/usr/local/share/qemu/OVMF_CODE.fd
-drive 
if=pflash,format=raw,unit=1,file=/AMDSEV/debian-12-genericcloud-amd64-20240717-1811.fd
-netdev user,id=vmnic  -device
virtio-net-pci,disable-legacy=on,iommu_platform=true,netdev=vmnic,romfile=
-drive 
file=/root/debian-12-genericcloud-amd64-20240717-1811.raw,if=none,id=disk0,format=raw
-device virtio-scsi-pci,id=scsi0,disable-legacy=on,iommu_platform=true
-device scsi-hd,drive=disk0 -machine memory-encryption=sev0,vmport=off
-object memory-backend-memfd,id=ram1,size=2048M,share=true,prealloc=false
-machine memory-backend=ram1 -object
sev-snp-guest,id=sev0,policy=0xb0000,cbitpos=51,reduced-phys-bits=1
-nographic -monitor pty -monitor unix:monitor,server,nowait  -device
virtio-serial-pci




root@localhost:~# sh q.sh 2>&1 | grep KVM
[pid 53235] ioctl(12, KVM_GET_API_VERSION, 0) = 12
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MEMORY_ATTRIBUTES) = 8
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GUEST_MEMFD) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_USER_MEMORY2) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IMMEDIATE_EXIT) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_NR_MEMSLOTS) = 32764
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MULTI_ADDRESS_SPACE) = 2
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VM_TYPES) = 31
[pid 53235] ioctl(12, KVM_CREATE_VM, 0x4 <unfinished ...>
[pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS) = 128
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MAX_VCPUS) = 4096
[pid 53235] write(2, "Number of hotpluggable cpus requ"..., 95Number
of hotpluggable cpus requested (255) exceeds the recommended cpus
supported by KVM (128)) = 95
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_USER_MEMORY) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
KVM_CAP_DESTROY_MEMORY_REGION_WORKS) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
KVM_CAP_JOIN_MEMORY_REGIONS_WORKS) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_INTERNAL_ERROR_DATA) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IOEVENTFD) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IOEVENTFD_ANY_LENGTH) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_TSS_ADDR) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_EXT_CPUID) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MP_STATE) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SIGNAL_MSI) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_DEBUGREGS) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VCPU_EVENTS) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_ROBUST_SINGLESTEP) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_ADJUST_CLOCK) = 14
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_IDENTITY_MAP_ADDR) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_COALESCED_MMIO) = 2
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_COALESCED_PIO) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION,
KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2) = 3
[pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd0370) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VCPU_EVENTS) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_NESTED_STATE) = 4224
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_INJECT_STATUS) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_READONLY_MEM) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQFD_RESAMPLE) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_VM_ATTRIBUTES) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_GUEST_DEBUG) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SET_GUEST_DEBUG2) = 2031619
[pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bd0040) = 0
[pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bcff10) = 0
[pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bcffa0) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XCRS) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SREGS2) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV_VP_INDEX) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_EXCEPTION_PAYLOAD) = 1
[pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_TRIPLE_FAULT_EVENT) = 1
[pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
[pid 53235] ioctl(12, KVM_GET_MSR_INDEX_LIST, 0x7ffdb6bd00f0) = -1
E2BIG (Argument list too long)
[pid 53235] ioctl(12, KVM_GET_MSR_INDEX_LIST, 0x55d227634b40) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_MSR_FEATURES) = 1
[pid 53235] ioctl(12, KVM_GET_MSR_FEATURE_INDEX_LIST, 0x7ffdb6bd00f0)
= -1 E2BIG (Argument list too long)
[pid 53235] ioctl(12, KVM_GET_MSR_FEATURE_INDEX_LIST, 0x55d2273a3ef0) = 0
[pid 53235] ioctl(13, KVM_SET_IDENTITY_MAP_ADDR, 0x7ffdb6bd00e0) = 0
[pid 53235] ioctl(13, KVM_SET_TSS_ADDR, 0xfeffd000) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_SMM) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_X86_NOTIFY_VMEXIT) = 0
[pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_X86_USER_SPACE_MSR) = 1
[pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd00f0) = 0
[pid 53235] ioctl(13, KVM_X86_SET_MSR_FILTER, 0x7ffdb6bcff30) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQCHIP) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQFD) = 1
[pid 53235] ioctl(13, KVM_CREATE_IRQCHIP, 0) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
[pid 53235] ioctl(13, KVM_CHECK_EXTENSION, KVM_CAP_SYNC_MMU) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_BINARY_STATS_FD) = 1
[pid 53235] ioctl(13, KVM_CREATE_GUEST_MEMFD, 0x7ffdb6bd0080) = 16
[pid 53235] ioctl(13, KVM_ENABLE_CAP, 0x7ffdb6bd0210) = 0
[pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725920) = -1
E2BIG (Argument list too long)
[pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725960) = -1
E2BIG (Argument list too long)
[pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725a40) = -1
E2BIG (Argument list too long)
[pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725a40) = -1
E2BIG (Argument list too long)
[pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725b90) = -1
E2BIG (Argument list too long)
[pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, 0x55d227725e20) = -1
E2BIG (Argument list too long)
[pid 53235] ioctl(12, KVM_GET_SUPPORTED_CPUID, {nent=61, entries=[...]}) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
[pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
[pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
[pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
[pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
[pid 53239] ioctl(13, KVM_CREATE_VCPU, 0) = 17
[pid 53239] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
[pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
[pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
[pid 53239] ioctl(17, KVM_GET_TSC_KHZ, 0) = 2000000
[pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
[pid 53239] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f856d5fa578) = 0
[pid 53239] ioctl(17, KVM_X86_SETUP_MCE, 0x55d227724b38) = 0
[pid 53239] ioctl(17, KVM_SET_CPUID2, {nent=29, entries=[...]}) = 0
[pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 2
[pid 53239] ioctl(17, KVM_GET_STATS_FD, 0) = 18
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
[pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
[pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
[pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
[pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
[pid 53240] ioctl(13, KVM_CREATE_VCPU, 1) = 19
[pid 53240] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
[pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
[pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
[pid 53240] ioctl(19, KVM_GET_TSC_KHZ, 0) = 2000000
[pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
[pid 53240] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f856cbfa578) = 0
[pid 53240] ioctl(19, KVM_X86_SETUP_MCE, 0x55d227757e48) = 0
[pid 53240] ioctl(19, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
[pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 2
[pid 53240] ioctl(19, KVM_GET_STATS_FD, 0) = 20
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING <unfinished ...>
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
[pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
[pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
[pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
[pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
[pid 53241] ioctl(13, KVM_CREATE_VCPU, 2) = 21
[pid 53241] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
[pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
[pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
[pid 53241] ioctl(21, KVM_GET_TSC_KHZ, 0) = 2000000
[pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
[pid 53241] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f84e7bfa578) = 0
[pid 53241] ioctl(21, KVM_X86_SETUP_MCE, 0x55d227761e18) = 0
[pid 53241] ioctl(21, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
[pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 2
[pid 53241] ioctl(21, KVM_GET_STATS_FD, 0) = 22
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_DEADLINE_TIMER) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
[pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_SYS_ATTRIBUTES) = 1
[pid 53235] ioctl(12, KVM_GET_DEVICE_ATTR, 0x7ffdb6bcffe0) = 0
[pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
[pid 53235] ioctl(12, KVM_GET_MSRS, 0x7ffdb6bd0010) = 1
[pid 53242] ioctl(13, KVM_CREATE_VCPU, 3) = 23
[pid 53242] ioctl(12, KVM_GET_VCPU_MMAP_SIZE, 0) = 12288
[pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_XSAVE2) = 4096
[pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
[pid 53242] ioctl(23, KVM_GET_TSC_KHZ, 0) = 2000000
[pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_HYPERV) = 1
[pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_MCE) = 32
[pid 53242] ioctl(12, KVM_X86_GET_MCE_CAP_SUPPORTED, 0x7f84e71fa578) = 0
[pid 53242] ioctl(23, KVM_X86_SETUP_MCE, 0x55d22776bd18) = 0
[pid 53242] ioctl(23, KVM_SET_CPUID2, {nent=30, entries=[...]}) = 0
[pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 2
[pid 53242] ioctl(23, KVM_GET_STATS_FD, 0) = 24
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING <unfinished ...>
[pid 53235] ioctl(13, KVM_GET_CLOCK, 0x7ffdb6bcfff0) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_ADJUST_CLOCK) = 14
[pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd00c0) = 0
[pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bd0150 <unfinished ...>
[pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd0050) = 0
[pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bd0050) = 0
[pid 53235] ioctl(13, KVM_CREATE_GUEST_MEMFD, 0x7ffdb6bd0050) = 10
[pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcffa0) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_IRQ_ROUTING) = 4096
[pid 53235] ioctl(13, KVM_SET_GSI_ROUTING, 0x55d227bbb830) = 0
[pid 53235] ioctl(13, KVM_UNREGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
[pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
[pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfdd0) = 0
[pid 53235] ioctl(13, KVM_REGISTER_COALESCED_MMIO, 0x7ffdb6bcfcd0) = 0
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_PIT_STATE2) = 1
[pid 53235] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_PIT2) = 1
[pid 53235] ioctl(13, KVM_CREATE_PIT2, 0x7ffdb6bd0040) = 0
[pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe40) = 0
[pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe90) = 0
[pid 53239] ioctl(17, KVM_SET_SREGS2, 0x7f856d5fb340 <unfinished ...>
[pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
[pid 53239] ioctl(17, KVM_GET_TSC_KHZ, 0) = 2000000
[pid 53239] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
[pid 53239] ioctl(17, KVM_SET_TSC_KHZ, 0x1e8480) = 0
[pid 53239] ioctl(17, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xfff0, rflags=0x2}) = 0
[pid 53239] ioctl(17, KVM_SET_XSAVE, 0x7f84e0001000) = 0
[pid 53239] ioctl(17, KVM_SET_XCRS, 0x7f856d5fb310) = 0
[pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 109
[pid 53239] ioctl(17, KVM_SET_VCPU_EVENTS, 0x7f856d5fb550) = 0
[pid 53239] ioctl(17, KVM_SET_MP_STATE, 0x7f856d5fb4c0) = 0
[pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
[pid 53239] ioctl(17, KVM_SET_DEBUGREGS, 0x7f856d5fb550) = 0
[pid 53240] ioctl(19, KVM_SET_SREGS2, 0x7f856cbfb340 <unfinished ...>
[pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
[pid 53240] ioctl(19, KVM_GET_TSC_KHZ, 0) = 2000000
[pid 53240] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
[pid 53240] ioctl(19, KVM_SET_TSC_KHZ, 0x1e8480) = 0
[pid 53240] ioctl(19, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xb004, rflags=0x2}) = 0
[pid 53240] ioctl(19, KVM_SET_XSAVE, 0x7f84d8001000) = 0
[pid 53240] ioctl(19, KVM_SET_XCRS, 0x7f856cbfb310) = 0
[pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 109
[pid 53240] ioctl(19, KVM_SET_VCPU_EVENTS, 0x7f856cbfb550) = 0
[pid 53240] ioctl(19, KVM_SET_MP_STATE, 0x7f856cbfb4c0) = 0
[pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
[pid 53240] ioctl(19, KVM_SET_DEBUGREGS, 0x7f856cbfb550) = 0
[pid 53241] ioctl(21, KVM_SET_SREGS2, 0x7f84e7bfb340 <unfinished ...>
[pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
[pid 53241] ioctl(21, KVM_GET_TSC_KHZ, 0) = 2000000
[pid 53241] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
[pid 53241] ioctl(21, KVM_SET_TSC_KHZ, 0x1e8480) = 0
[pid 53241] ioctl(21, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xb004, rflags=0x2}) = 0
[pid 53241] ioctl(21, KVM_SET_XSAVE, 0x7f84d4001000) = 0
[pid 53241] ioctl(21, KVM_SET_XCRS, 0x7f84e7bfb310) = 0
[pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 109
[pid 53241] ioctl(21, KVM_SET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
[pid 53241] ioctl(21, KVM_SET_MP_STATE, 0x7f84e7bfb4c0) = 0
[pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
[pid 53241] ioctl(21, KVM_SET_DEBUGREGS, 0x7f84e7bfb550) = 0
[pid 53242] ioctl(23, KVM_SET_SREGS2, 0x7f84e71fb340) = 0
[pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_GET_TSC_KHZ) = 1
[pid 53242] ioctl(23, KVM_GET_TSC_KHZ, 0) = 2000000
[pid 53242] ioctl(12, KVM_CHECK_EXTENSION, KVM_CAP_TSC_CONTROL) = 1
[pid 53242] ioctl(23, KVM_SET_TSC_KHZ, 0x1e8480) = 0
[pid 53242] ioctl(23, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xb004, rflags=0x2}) = 0
[pid 53242] ioctl(23, KVM_SET_XSAVE, 0x7f84cc001000) = 0
[pid 53242] ioctl(23, KVM_SET_XCRS, 0x7f84e71fb310) = 0
[pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 109
[pid 53242] ioctl(23, KVM_SET_VCPU_EVENTS, 0x7f84e71fb550) = 0
[pid 53242] ioctl(23, KVM_SET_MP_STATE, 0x7f84e71fb4c0) = 0
[pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
[pid 53242] ioctl(23, KVM_SET_DEBUGREGS, 0x7f84e71fb550) = 0
[pid 53239] ioctl(17, KVM_GET_VCPU_EVENTS, 0x7f856d5fb550) = 0
[pid 53239] ioctl(17, KVM_GET_MP_STATE, 0x7f856d5fb4c0) = 0
[pid 53239] ioctl(17, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xfff0, rflags=0x2}) = 0
[pid 53239] ioctl(17, KVM_GET_XSAVE2, 0x7f84e0001000) = 0
[pid 53239] ioctl(17, KVM_GET_XCRS, 0x7f856d5fb320) = 0
[pid 53239] ioctl(17, KVM_GET_SREGS2, 0x7f856d5fb350) = 0
[pid 53239] ioctl(17, KVM_GET_MSRS, 0x7f84e0002010) = 110
[pid 53239] ioctl(17, KVM_GET_LAPIC, 0x7f856d5fb090) = 0
[pid 53239] ioctl(17, KVM_GET_DEBUGREGS, 0x7f856d5fb550) = 0
[pid 53240] ioctl(19, KVM_GET_VCPU_EVENTS, 0x7f856cbfb550) = 0
[pid 53240] ioctl(19, KVM_GET_MP_STATE, 0x7f856cbfb4c0) = 0
[pid 53240] ioctl(19, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xb004, rflags=0x2}) = 0
[pid 53240] ioctl(19, KVM_GET_XSAVE2, 0x7f84d8001000) = 0
[pid 53240] ioctl(19, KVM_GET_XCRS, 0x7f856cbfb320) = 0
[pid 53240] ioctl(19, KVM_GET_SREGS2, 0x7f856cbfb350) = 0
[pid 53240] ioctl(19, KVM_GET_MSRS, 0x7f84d8002010) = 110
[pid 53240] ioctl(19, KVM_GET_LAPIC, 0x7f856cbfb090) = 0
[pid 53240] ioctl(19, KVM_GET_DEBUGREGS, 0x7f856cbfb550) = 0
[pid 53241] ioctl(21, KVM_GET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
[pid 53241] ioctl(21, KVM_GET_MP_STATE, 0x7f84e7bfb4c0) = 0
[pid 53241] ioctl(21, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xb004, rflags=0x2}) = 0
[pid 53241] ioctl(21, KVM_GET_XSAVE2, 0x7f84d4001000) = 0
[pid 53241] ioctl(21, KVM_GET_XCRS, 0x7f84e7bfb320) = 0
[pid 53241] ioctl(21, KVM_GET_SREGS2, 0x7f84e7bfb350) = 0
[pid 53241] ioctl(21, KVM_GET_MSRS, 0x7f84d4002010) = 110
[pid 53241] ioctl(21, KVM_GET_LAPIC, 0x7f84e7bfb090) = 0
[pid 53241] ioctl(21, KVM_GET_DEBUGREGS, 0x7f84e7bfb550) = 0
[pid 53242] ioctl(23, KVM_GET_VCPU_EVENTS, 0x7f84e71fb550) = 0
[pid 53242] ioctl(23, KVM_GET_MP_STATE, 0x7f84e71fb4c0) = 0
[pid 53242] ioctl(23, KVM_GET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xb004, rflags=0x2}) = 0
[pid 53242] ioctl(23, KVM_GET_XSAVE2, 0x7f84cc001000) = 0
[pid 53242] ioctl(23, KVM_GET_XCRS, 0x7f84e71fb320) = 0
[pid 53242] ioctl(23, KVM_GET_SREGS2, 0x7f84e71fb350) = 0
[pid 53242] ioctl(23, KVM_GET_MSRS, 0x7f84cc002010) = 110
[pid 53242] ioctl(23, KVM_GET_LAPIC, 0x7f84e71fb090) = 0
[pid 53242] ioctl(23, KVM_GET_DEBUGREGS, 0x7f84e71fb550) = 0
[pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bd01d0) = 0
[pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bd0220) = 0
[pid 53235] ioctl(13, KVM_GET_PIT2, 0x7ffdb6bd00b0) = 0
[pid 53235] ioctl(13, KVM_SET_PIT2, 0x7ffdb6bd00d0) = 0
[pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcffa0) = 0
[pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe40) = 0
[pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe90) = 0
[pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe60) = 0
[pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfeb0) = 0
[pid 53235] ioctl(13, KVM_SET_PIT2, 0x7ffdb6bcfe50) = 0
[pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcfce0) = 0
[pid 53235] ioctl(13, KVM_SET_IRQCHIP, 0x7ffdb6bcfce0) = 0
[pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfe70) = 0
[pid 53235] ioctl(13, KVM_IRQ_LINE_STATUS, 0x7ffdb6bcfec0) = 0
[pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0
<unfinished ...>
[pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
[pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
[pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
[pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
[pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
[pid 53235] ioctl(13, KVM_SET_USER_MEMORY_REGION2, 0x7ffdb6bcfea0) = 0
[pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcff30) = 0
[pid 53239] ioctl(17, KVM_TPR_ACCESS_REPORTING, 0x7f856d5fb5f0) = 0
[pid 53240] ioctl(19, KVM_TPR_ACCESS_REPORTING, 0x7f856cbfb5f0 <unfinished ...>
[pid 53241] ioctl(21, KVM_TPR_ACCESS_REPORTING, 0x7f84e7bfb5f0) = 0
[pid 53242] ioctl(23, KVM_TPR_ACCESS_REPORTING, 0x7f84e71fb5f0) = 0
[pid 53235] ioctl(17, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0) = 0
[pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
[pid 53239] ioctl(17, KVM_SET_LAPIC, 0x7f856d5fb200) = 0
[pid 53235] ioctl(19, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
[pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
[pid 53240] ioctl(19, KVM_SET_LAPIC, 0x7f856cbfb200) = 0
[pid 53235] ioctl(21, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
[pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
[pid 53241] ioctl(21, KVM_SET_LAPIC, 0x7f84e7bfb200) = 0
[pid 53235] ioctl(23, KVM_SET_VAPIC_ADDR, 0x7ffdb6bd02f0 <unfinished ...>
[pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
[pid 53242] ioctl(23, KVM_SET_LAPIC, 0x7f84e71fb200) = 0
[pid 53239] ioctl(17, KVM_SET_SREGS2, 0x7f856d5fb340) = 0
[pid 53239] ioctl(17, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xfff0, rflags=0x2}) = 0
[pid 53239] ioctl(17, KVM_SET_XSAVE, 0x7f84e0001000) = 0
[pid 53239] ioctl(17, KVM_SET_XCRS, 0x7f856d5fb310) = 0
[pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 109
[pid 53239] ioctl(17, KVM_SET_VCPU_EVENTS, 0x7f856d5fb550) = 0
[pid 53239] ioctl(17, KVM_SET_MP_STATE, 0x7f856d5fb4c0) = 0
[pid 53239] ioctl(17, KVM_SET_MSRS, 0x7f84e0002010) = 1
[pid 53239] ioctl(17, KVM_SET_DEBUGREGS, 0x7f856d5fb550) = 0
[pid 53240] ioctl(19, KVM_SET_SREGS2, 0x7f856cbfb340) = 0
[pid 53240] ioctl(19, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xb004, rflags=0x2}) = 0
[pid 53240] ioctl(19, KVM_SET_XSAVE, 0x7f84d8001000) = 0
[pid 53240] ioctl(19, KVM_SET_XCRS, 0x7f856cbfb310) = 0
[pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 109
[pid 53240] ioctl(19, KVM_SET_VCPU_EVENTS, 0x7f856cbfb550) = 0
[pid 53240] ioctl(19, KVM_SET_MP_STATE, 0x7f856cbfb4c0) = 0
[pid 53240] ioctl(19, KVM_SET_MSRS, 0x7f84d8002010) = 1
[pid 53240] ioctl(19, KVM_SET_DEBUGREGS, 0x7f856cbfb550) = 0
[pid 53241] ioctl(21, KVM_SET_SREGS2, 0x7f84e7bfb340) = 0
[pid 53241] ioctl(21, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xb004, rflags=0x2}) = 0
[pid 53241] ioctl(21, KVM_SET_XSAVE, 0x7f84d4001000) = 0
[pid 53241] ioctl(21, KVM_SET_XCRS, 0x7f84e7bfb310) = 0
[pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 109
[pid 53241] ioctl(21, KVM_SET_VCPU_EVENTS, 0x7f84e7bfb550) = 0
[pid 53241] ioctl(21, KVM_SET_MP_STATE, 0x7f84e7bfb4c0) = 0
[pid 53241] ioctl(21, KVM_SET_MSRS, 0x7f84d4002010) = 1
[pid 53241] ioctl(21, KVM_SET_DEBUGREGS, 0x7f84e7bfb550) = 0
[pid 53242] ioctl(23, KVM_SET_SREGS2, 0x7f84e71fb340) = 0
[pid 53242] ioctl(23, KVM_SET_REGS, {rax=0, ..., rsp=0, rbp=0, ...,
rip=0xb004, rflags=0x2}) = 0
[pid 53242] ioctl(23, KVM_SET_XSAVE, 0x7f84cc001000) = 0
[pid 53242] ioctl(23, KVM_SET_XCRS, 0x7f84e71fb310) = 0
[pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 109
[pid 53242] ioctl(23, KVM_SET_VCPU_EVENTS, 0x7f84e71fb550) = 0
[pid 53242] ioctl(23, KVM_SET_MP_STATE, 0x7f84e71fb4c0) = 0
[pid 53242] ioctl(23, KVM_SET_MSRS, 0x7f84cc002010) = 1
[pid 53242] ioctl(23, KVM_SET_DEBUGREGS, 0x7f84e71fb550) = 0
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0 <unfinished ...>
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = -1 E2BIG
(Argument list too long)
[pid 53235] ioctl(17, KVM_GET_CPUID2, 0x7ffdb6bcf3a0) = 0
[pid 53235] ioctl(13, KVM_SET_MEMORY_ATTRIBUTES, 0x7ffdb6bcf640) = 0
[pid 53235] ioctl(13, KVM_MEMORY_ENCRYPT_OP, 0x7ffdb6bcf6d0) = -1
EINVAL (Invalid argument)

On Mon, Aug 5, 2024 at 4:51 PM Roth, Michael <michael.r...@amd.com> wrote:
[AMD Official Use Only - AMD Internal Distribution Only]

-----Original Message-----
From: Paolo Bonzini <pbonz...@redhat.com>
Sent: Monday, August 5, 2024 8:36 AM
To: Arvid Picciani <arvid@kraud.cloud>
Cc: Roth, Michael <michael.r...@amd.com>; qemu-discuss@nongnu.org
Subject: Re: SNP: qemu upstream vs AMD fork on kernel 6.11

On Mon, Aug 5, 2024 at 3:26 PM Arvid Picciani <arvid@kraud.cloud> wrote:
Hi,

with linux 6.11 it looks like kvm SNP host api is finally there.

However, current qemu upstream appears to be tested against a much
older kernel by redhat (according to the libvirt IRC its via coconut
svsm),
It's tested against both 6.11 (actually a slightly older branch in
kvm.git) and the CentOS Stream 9 kernel. The CentOS Stream 9 kernel
has the same SNP code as Linux 6.11.

while the current head of the amd fork on github works just
fine with 6.11.
The current head of the AMD fork (https://github.com/AMDESE/qemu
snp-latest) is not in line with the upstream kernel, for example:

66e7fbadfc8 i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State Changes
e9898385037 i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State
Changes (MSR-based)
It actually adds the KVM_HC_MAP_GPA_RANGE handling on top, and then drops all 
KVM_EXIT_VMGEXIT handling completely as part of:

   commit 62434c7dd57fcf2e02f6765b9d0d2588b5e032d3
   Author: Michael Roth <michael.r...@amd.com>
   Date:   Wed May 1 01:14:39 2024 -0500

       *i386/sev: Rework GHCB extended guest request handling

       TODO: drop the PSC patches completely so this rework can become a clean
       standalone patch.

The v4 patches that actually went into QEMU 9.1 have this changeset 
appropriately split/squashed into their proper place, but I think the upstream 
behavior should be about the same as what is in snp-latest QEMU tree currently.

If snp-latest works, but upstream QEMU does not, then there is potentially a 
regression upstream. However I just re-tested latest QEMU commit (f9851d2ffef5) 
against upstream KVM and didn't see any issue.

QEMU 9.1 is already is hard-freeze, so if there is a confirmed breakage please 
share the full details and steps to reproduce so it can hopefully be sorted 
before the 9.1 release.

-Mike

What problems are you seeing with Linux 6.11?

Paolo

there's also this old patch missing to enable virtiofsd
https://lists.gnu.org/archive/html/qemu-devel/2022-01/msg03456.html

i would rebase that and send it again, but current main is broken on
6.11, so wondering where qemu is heading.

thanks

Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded



Reply via email to