[Bug 1782205] Re: KVM SnowRidge enable new ISAs
This is actually a KVM/qemu feature. "Xen" part was autofilled. qemu 3.0 commit 0da0fb062 x86/cpu: Enable CLDEMOTE(Demote Cache Line) cpu feature linux/kvm commit: 0ea3286e2d KVM: x86: Expose CLDEMOTE CPU feature to guest VM -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782205 Title: KVM SnowRidge enable new ISAs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1782205/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1790690] [NEW] KVM Crystal Ridge Lack of data persistence guarantee of QEMU writes to host PMEM
Public bug reported: When the host persistent memory is used as the backend of vNVDIMM, QEMU itself may write to the host pmem, e.g., in vNVDIMM label emulation and live migration. In those cases, QEMU needs to take necessary operations (e.g., flush&fence after writes, or store with non-temporal hint) to ensure the data persistence of its own writes to PMEM. Therefore, data on vNVDIMM can be in a consistent status on abnormal termination of QEMU (e.g., QEMU/host kernel crash, host power failure, etc.). Unfortunately, such operations are missed in current QEMU implementation. Here’s the list of qemu commits (from qemu 3.0): 56eb90a migration/ram: ensure write persistence on loading all data to PMEM. 469dd51 migration/ram: Add check and info message to nvdimm post copy. faf8a13 mem/nvdimm: ensure write persistence to PMEM in label emulation a4de855 hostmem-file: add the 'pmem' option 1782440 configure: add libpmem support cbfc017 memory, exec: switch file ram allocation functions to 'flags' parameters b0e5de9 memory, exec: Expose all memory block related flags. ** Affects: kvm (Ubuntu) Importance: Undecided Status: New ** Tags: intel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1790690 Title: KVM Crystal Ridge Lack of data persistence guarantee of QEMU writes to host PMEM To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1790690/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1857033] [NEW] qemu kvm add Cooper Lake cpu model
Public bug reported: This patchset is to add CPU model for intel processor Cooper Lake. It will inherit features from the existing CPU model Cascadelake-Server, meanwhile, add the platform associated new instruction and feature for speculative execution which the host supports. There are associated feature bit and macro defined here as needed. https://lore.kernel.org/qemu- devel/157089265511.19705.15924275646599772449@37313f22b938/T/ in post (yet untagged) qemu-4.2.0 77b168d221191156c47fcd8d1c47329dfdb9439e i386: Add MSR feature bit for MDS-NO 5af514d0cb314f43bc53f2aefb437f6451d64d0c i386: Add macro for stibp 22a866b6166db5caa4abaa6e656c2a431fa60726 i386: Add new CPU model Cooperlake ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1857033 Title: qemu kvm add Cooper Lake cpu model To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1857033/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782206] Re: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)
Additional KVM patches has been merged (post 5.3-rc8): e69e72faa3a KVM: x86: Add support for user wait instructions 6e3ba4abcea KVM: vmx: Emulate MSR IA32_UMWAIT_CONTROL bf653b78f96 KVM: vmx: Introduce handle_unexpected_vmexit and handle WAITPKG vmexit [There's no Xen AIA work (yet)] -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782206 Title: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1829760] [NEW] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.
Public bug reported: Description of problem: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. How reproducible: Upstream always, Ubuntu unknown. Steps to Reproduce: 1. Boot up guest using: -cpu Cascadelake-Server [root@clx-2s2 yexin]# qemu-system-x86_64 -accel kvm -drive if=virtio,id=hd,file=/home/yexin/rhel7u6.qcow2,format=qcow2 -m 4096 -smp 4 -cpu Cascadelake-Server -serial stdio char device redirected to /dev/pts/3 (label serial0) qemu-system-x86_64: warning: host doesn't support requested feature: CPUID.07H:ECX [bit 4] qemu-system-x86_64: warning: host doesn't support requested feature: CPUID.07H:ECX [bit 4] qemu-system-x86_64: warning: host doesn't support requested feature: CPUID.07H:ECX [bit 4] qemu-system-x86_64: warning: host doesn't support requested feature: CPUID.07H:ECX [bit 4] 2. To check CPU ID related to features[FEAT_7_0_EDX] :CPUID_7_0_EDX_ARCH_CAPABILITIES Actual results: Host's cpuid: 0x0007 0x00: eax=0x ebx=0xd39b ecx=0x0818 edx=0xbc00 (EDX bit 29=1) Guest's cpuid : 0x0007 0x00: eax=0x ebx=0xd19f0fb9 ecx=0x0818 edx=0x8400 (EDX bit 29=0) Expected results: Both host and guest's CPUID.07H EDX bit 29 should be 1. Additional info: Upstream 5.0 fixed, commit: 2bdb76c015df7125783d8394d6339d181cb5bc30 Kernel: commit 2bdb76c015df7125783d8394d6339d181cb5bc30 Author: Xiaoyao Li Date: Fri Mar 8 15:57:20 2019 +0800 kvm/x86: Move MSR_IA32_ARCH_CAPABILITIES to array emulated_msrs commit 0cf9135b773bf32fba9dd8e6699c1b331ee4b749 Author: Sean Christopherson Date: Thu Mar 7 15:43:02 2019 -0800 KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts QEMU: commit 014018e19b3c54dd1bf5072bc912ceffea40abe8 Author: Eduardo Habkost Date: Fri Jan 25 20:06:06 2019 -0200 i386: Make arch_capabilities migratable commit 485b1d256bcb0874bcde0223727c159b6837e6f8 Author: Eduardo Habkost Date: Fri Jan 25 20:06:05 2019 -0200 i386: kvm: Disable arch_capabilities if MSR can't be set commit b0a1980384fc265d91de7e09aa5fe531a69e6288 Author: Tao Xu Date: Thu Dec 27 10:43:03 2018 +0800 i386: Update stepping of Cascadelake-Server commit aec5e9c3a94cf8b7920f59bef69a6f426092c4a0 Author: Bandan Das Date: Sun Nov 25 23:17:28 2018 -0500 kvm: Use KVM_GET_MSR_INDEX_LIST for MSR_IA32_ARCH_CAPABILITIES support commit 07585923485952bf4cb7da563c9f91fecc85d09c Author: Robert Hoo Date: Mon Oct 15 12:47:24 2018 +0800 x86: Data structure changes to support MSR based features commit f57bceb6ab5163ddd6c41ff4344ab8cf28a9c63d Author: Robert Hoo Date: Mon Oct 15 12:47:23 2018 +0800 kvm: Add support to KVM_GET_MSR_FEATURE_INDEX_LIST and KVM_GET_MSRS system ioctl commit d86f963694df27f11b3681ffd225c9362de1b634 Author: Robert Hoo Date: Mon Oct 15 12:47:25 2018 +0800 x86: define a new MSR based feature word – FEATURE_WORDS_ARCH_CAPABILITIES commit c7a88b52f62b30c04158eeb07f73e3f72221b6a8 Author: Tao Xu Date: Wed Sep 19 11:11:22 2018 +0800 i386: Add new model of Cascadelake-Server commit 3fc7c73139d2d38ae80c3b0bc963b1ac1555924c Author: Robert Hoo Date: Thu Jul 5 17:09:55 2018 +0800 i386: Add CPUID bit and feature words for IA32_ARCH_CAPABILITIES MSR commit 8a11c62da9146dd89aee98947e6bd831e65a970d Author: Robert Hoo Date: Thu Jul 5 17:09:58 2018 +0800 i386: Add new CPU model Icelake-{Server,Client} commit 8c80c99fcceabd0708a5a83f08577e778c9419f5 Author: Robert Hoo Date: Thu Jul 5 17:09:54 2018 +0800 i386: Add new MSR indices for IA32_PRED_CMD and IA32_ARCH_CAPABILITIES ** Affects: xen (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1829760 Title: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1829760/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1829760] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.
Yes, this is qemu/kvm, not xen. Strange, I thought I filed it against kvm. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1829760 Title: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1829760/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
RE: [Bug 1829760] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.
*** This bug is a duplicate of bug 1828495 *** https://bugs.launchpad.net/bugs/1828495 No reason not to dup. Did not find 1828495 before writing 1829760 -Original Message- From: boun...@canonical.com [mailto:boun...@canonical.com] On Behalf Of Dan Streetman Sent: Tuesday, May 21, 2019 1:04 PM To: Lai, Paul C Subject: [Bug 1829760] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. note bug 1828495...even the description appears taken from that bug. is there a reason this isn't a dup? -- You received this bug notification because you are subscribed to the bug report. https://bugs.launchpad.net/bugs/1829760 Title: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. Status in qemu package in Ubuntu: New Bug description: Description of problem: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. How reproducible: Upstream always, Ubuntu unknown. Steps to Reproduce: 1. Boot up guest using: -cpu Cascadelake-Server [root@clx-2s2 yexin]# qemu-system-x86_64 -accel kvm -drive if=virtio,id=hd,file=/home/yexin/rhel7u6.qcow2,format=qcow2 -m 4096 -smp 4 -cpu Cascadelake-Server -serial stdio char device redirected to /dev/pts/3 (label serial0) qemu-system-x86_64: warning: host doesn't support requested feature: CPUID.07H:ECX [bit 4] qemu-system-x86_64: warning: host doesn't support requested feature: CPUID.07H:ECX [bit 4] qemu-system-x86_64: warning: host doesn't support requested feature: CPUID.07H:ECX [bit 4] qemu-system-x86_64: warning: host doesn't support requested feature: CPUID.07H:ECX [bit 4] 2. To check CPU ID related to features[FEAT_7_0_EDX] :CPUID_7_0_EDX_ARCH_CAPABILITIES Actual results: Host's cpuid: 0x0007 0x00: eax=0x ebx=0xd39b ecx=0x0818 edx=0xbc00 (EDX bit 29=1) Guest's cpuid : 0x0007 0x00: eax=0x ebx=0xd19f0fb9 ecx=0x0818 edx=0x8400 (EDX bit 29=0) Expected results: Both host and guest's CPUID.07H EDX bit 29 should be 1. Additional info: Upstream 5.0 fixed, commit: 2bdb76c015df7125783d8394d6339d181cb5bc30 Kernel: commit 2bdb76c015df7125783d8394d6339d181cb5bc30 Author: Xiaoyao Li Date: Fri Mar 8 15:57:20 2019 +0800 kvm/x86: Move MSR_IA32_ARCH_CAPABILITIES to array emulated_msrs commit 0cf9135b773bf32fba9dd8e6699c1b331ee4b749 Author: Sean Christopherson Date: Thu Mar 7 15:43:02 2019 -0800 KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts QEMU: commit 014018e19b3c54dd1bf5072bc912ceffea40abe8 Author: Eduardo Habkost Date: Fri Jan 25 20:06:06 2019 -0200 i386: Make arch_capabilities migratable commit 485b1d256bcb0874bcde0223727c159b6837e6f8 Author: Eduardo Habkost Date: Fri Jan 25 20:06:05 2019 -0200 i386: kvm: Disable arch_capabilities if MSR can't be set commit b0a1980384fc265d91de7e09aa5fe531a69e6288 Author: Tao Xu Date: Thu Dec 27 10:43:03 2018 +0800 i386: Update stepping of Cascadelake-Server commit aec5e9c3a94cf8b7920f59bef69a6f426092c4a0 Author: Bandan Das Date: Sun Nov 25 23:17:28 2018 -0500 kvm: Use KVM_GET_MSR_INDEX_LIST for MSR_IA32_ARCH_CAPABILITIES support commit 07585923485952bf4cb7da563c9f91fecc85d09c Author: Robert Hoo Date: Mon Oct 15 12:47:24 2018 +0800 x86: Data structure changes to support MSR based features commit f57bceb6ab5163ddd6c41ff4344ab8cf28a9c63d Author: Robert Hoo Date: Mon Oct 15 12:47:23 2018 +0800 kvm: Add support to KVM_GET_MSR_FEATURE_INDEX_LIST and KVM_GET_MSRS system ioctl commit d86f963694df27f11b3681ffd225c9362de1b634 Author: Robert Hoo Date: Mon Oct 15 12:47:25 2018 +0800 x86: define a new MSR based feature word – FEATURE_WORDS_ARCH_CAPABILITIES commit c7a88b52f62b30c04158eeb07f73e3f72221b6a8 Author: Tao Xu Date: Wed Sep 19 11:11:22 2018 +0800 i386: Add new model of Cascadelake-Server commit 3fc7c73139d2d38ae80c3b0bc963b1ac1555924c Author: Robert Hoo Date: Thu Jul 5 17:09:55 2018 +0800 i386: Add CPUID bit and feature words for IA32_ARCH_CAPABILITIES MSR commit 8a11c62da9146dd89aee98947e6bd831e65a970d Author: Robert Hoo Date: Thu Jul 5 17:09:58 2018 +0800 i386: Add new CPU model Icelake-{Server,Client} commit 8c80c99fcceabd0708a5a83f08577e778c9419f5 Author: Robert Hoo Date: Thu Jul 5 17:09:54 2018 +0800 i386: Add new MSR indices for IA32_PRED_CMD and IA32_ARCH_CAPABILITIES To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1829760/+subscriptions -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1829760 Title: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1829760/+subscript
[Bug 1828495] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.
This patch is also needed for kernels before 4.18 cd28325249 KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR ( 25-6-18) This patchset populates the structure in arch/x86/kvm/x86.c: msr_based_features{} With out this patch, qemu asserts at kvm_get_supported_feature_msrs(KVMState *s): assert(msr_list.nmsrs > 0); -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1828495 Title: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1828495/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782206] Re: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)
qemu post 4.1.0 (yet untagged) 67192a298f5 x86/cpu: Add support for UMONITOR/UMWAIT/TPAUSE 6508799707b target/i386: Add support for save/load IA32_UMWAIT_CONTROL MSR -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782206 Title: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782206] Re: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)
33823f4d6 x86/cpufeatures: Enumerate MOVDIRI instruction ace6485a0 x86/cpufeatures: Enumerate MOVDIR64B instruction 65e259d5c tools arch x86: Update tools's copy of cpufeatures.h (linux 5.1-rc1) 74f2370bb KVM: x86: expose MOVDIRI CPU feature into VM. c029b5deb KVM: x86: expose MOVDIR64B CPU feature into VM. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782206 Title: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782209] Re: KVM SnowRidge Split-lock disable
Related QEMU patch can be found at: https://lists.gnu.org/archive/html/qemu-devel/2019-03/msg00507.html and related kvm-unit-test can be found at: https://patchwork.kernel.org/patch/10837677/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782209 Title: KVM SnowRidge Split-lock disable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782209/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782206] Re: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)
Chris: a little of both. The UMONITOR/UMWAIT/TPAUSE is delay, but the rest has been upstreamed (as you already noted.) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782206 Title: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
RE: [Bug 1782208] Re: KVM SnowRidge Adaptive PEBS
No updates/upstream at this time. -Original Message- From: boun...@canonical.com [mailto:boun...@canonical.com] On Behalf Of Christian Ehrhardt ? Sent: Monday, May 6, 2019 10:29 PM To: Lai, Paul C Subject: [Bug 1782208] Re: KVM SnowRidge Adaptive PEBS Are there updates and/or references to commits in those projects already that we can use to track and integrate those features? -- You received this bug notification because you are subscribed to the bug report. https://bugs.launchpad.net/bugs/1782208 Title: KVM SnowRidge Adaptive PEBS Status in linux package in Ubuntu: Incomplete Status in qemu package in Ubuntu: New Status in xen package in Ubuntu: New Bug description: With the addition of more CPU state information of data, the PEBS(Processor Event Based Sampling) record size is greatly increased. However, most general users of PEBS require just the eventingIP and do not require such a large PEBS record. Adaptive PEBS provides Software the capability to configure the PEBS records to capture only the data of interest, keeping the record size compact. Need modify KVM and Qemu. Adaptive PEBS (Processor Event Based Sampling) is configurable PEBS records for only interested data collection from massive PEBS data. It depends on PEBS via PT. The enabling work includes: ◾Expose this feature and MSR configure bit in guest PEBS driver ◾Save and restore status in vCPU when vm_exit and vm_entry ◾Support both host-guest mode and system mode. Target Kernel: 5.2 Target Release: 19.10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782208/+subscriptions -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782208 Title: KVM SnowRidge Adaptive PEBS To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782208/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782205] [NEW] KVM SnowRidge enable new ISAs
Public bug reported: Add KVM support for SnowRidge New Instructions: GFNI and CLDEMOT GFNI: New instruction to compute an affine transformation in the Galois Field. The instruction is described here: https://software.intel.com/sites/default/files/managed/c5/15/architecture-instruction-set-extensions-programming-reference.pdf CLDEMOT: New instruction to hint to hardware that a cache line is likely to be shared. This is used to improve core-to-core communication. Upstream Target is Linux 4.20 ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782205 Title: KVM SnowRidge enable new ISAs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1782205/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782207] [NEW] KVM SnowRidge Processor Trace v4
Public bug reported: The PEBS(Processor Event Based Sampling) facility allows software to profile workload behavior by periodically capturing machine state, memory access information and other groups of architectural information. In native systems, PEBS uses a debug store mechanism to store a set of architectural state information for the processor and we need to specify a linear pages for the output buffer which must be pinned to physical pages. In virtualized systems, pinning the platform physical pages for the output buffer is difficult. PT V4 provide a method to format PEBS sampling data to new type of trace packet and output to Intel Processor Trace buffer. This depend on PT-VMX(Enabling use of EPT to redirect PT output)which enabled in ICX platform. Need modify in KVM and Qemu. Intel Processor Trace v4 task list: ◾PT VMX which is done and in upstream phase, and need more review and update effort ◾PEBS via PT on SNR. It's new added task, which target to ww48 ◾PT PEBS/EMON integration. This feature allows PEBS data to be written into PT output channel, leveraging PT Virtualization work for PEBS. ◾cpuid support and context switch ◾Support host-guest mode and system mode More Open feature includes Live Migration support and LBR support Upstream target Linux 4.20 ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782207 Title: KVM SnowRidge Processor Trace v4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1782207/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782208] [NEW] KVM SnowRidge Adaptive PEBS
Public bug reported: With the addition of more CPU state information of data, the PEBS(Processor Event Based Sampling) record size is greatly increased. However, most general users of PEBS require just the eventingIP and do not require such a large PEBS record. Adaptive PEBS provides Software the capability to configure the PEBS records to capture only the data of interest, keeping the record size compact. Need modify KVM and Qemu. Adaptive PEBS (Processor Event Based Sampling) is configurable PEBS records for only interested data collection from massive PEBS data. It depends on PEBS via PT. The enabling work includes: ◾Expose this feature and MSR configure bit in guest PEBS driver ◾Save and restore status in vCPU when vm_exit and vm_entry ◾Support both host-guest mode and system mode. ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782208 Title: KVM SnowRidge Adaptive PEBS To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1782208/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782206] [NEW] KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)
Public bug reported: CPU core (Tremont) includes Accelerator Interfacing Architecture (AIA) features including: - UMONITOR/UMWAIT: Ring-3 MONITOR/MWAIT with timeout. For memory-based synch with accelerators - TPAUSE: Monitor-less wait (with timeout). For wait-on-multiple or wait-for-interrupt usages - MOVDIRI: 8B streaming doorbell write capability. For streaming accelerator usages. - MOVDIR64B: Non-temporal write with 64B guaranteed write-atomicity. For latency critical accelerator usages Upstream target linux 4.20 ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782206 Title: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1782206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782209] [NEW] KVM SnowRidge Split-lock disable
Public bug reported: When bit 29 is set in Test Control MSR register 0x33, a #AC execption is generated for split locked accesses at all CPL irrespective of CR0.AM or EFLAGS.AC. This feature can help developers to capture memory accesses that across cachelines with #LOCK assertion. Then developers can reconstruct their program accordingly Upstream target linux 4.20 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New ** Tags: intel ** Package changed: xen (Ubuntu) => kvm (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782209 Title: KVM SnowRidge Split-lock disable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1782209/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782212] [NEW] KVM CLX ACPI HMAT table support
Public bug reported: ACPI HMAT table support : HMAT is a new ACPI table that records the performance parameter of memory, so MCDRAM (or next gen HBM2) can be described well by this table. We need to support this table in kernel and qemu so that guest can get and parse this table then to find where the high-performance memory is. Heterogeneous Memory Attribute Table (HMAT) describes the memory attributes, such as memory side cache attributes and bandwidth and latency details, related to the System Physical Address (SPA) Memory Ranges. The software is expected to use this information as hint for optimization. HMAT is defined in ACPI 6.2: 5.2.27 Heterogeneous Memory Attribute Table (HMAT). http://www.uefi.org/sites/default/files/resources/ACPI_6_2.pdf patches: http://lists.nongnu.org/archive/html/qemu-devel/2018-06/msg05368.html ** Affects: kvm (Ubuntu) Importance: Undecided Status: New ** Tags: intel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782212 Title: KVM CLX ACPI HMAT table support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1782212/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1782212] Re: KVM CLX ACPI HMAT table support
Upstream target Linux 4.20 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1782212 Title: KVM CLX ACPI HMAT table support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1782212/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1739665] [NEW] [Feature] KVM CLX avx512_vnni
Public bug reported: This feature has been released in ICX platform and the definition of AVX512_VNNI as below AVX512_VNNI Vector Nerual Network Instructions, an addition to AVX512. cpuid.(7,0). ECX[11] This is a new instruction to support machine learning. This instructions is pure HW features, currently, there is no test cases for this new instruction, we only check CPUID info by cpuid tool. target kernel 4.16 ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1739665 Title: [Feature] KVM CLX avx512_vnni To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1739665/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1725390] Re: bits/libc-header-start.h: No such file
I re-installed 17.10 and cannot reproduce the issue. Thanks for the words. Marked bug "Invalid" ** Changed in: xen (Ubuntu) Status: Incomplete => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1725390 Title: bits/libc-header-start.h: No such file To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1725390/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1674587] Re: [HPC, KNM][Xen] avx512_4vnniw, avx512_4fmaps enabling
If memory serves, Xen 4.9 is in Artful. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1674587 Title: [HPC, KNM][Xen] avx512_4vnniw, avx512_4fmaps enabling To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1674587/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1749248] [NEW] gvt-g support local displays
Public bug reported: Feature description: dma-buf is an uniform mechanism to share DMA buffers across different devices and subsystems. dma-buf for intel GVT-g is mainly used to share the vgpu's framebuffer to userspace to leverage userspace graphics stacks to render the framebuffer to the display monitor. The main idea is that we create a gem object and set vgpu's framebuffer as its backing storage. Then, export a dma-buf associated with this gem object. With the fd of this dma-buf, userspace can directly handle this buffer. Applied platform: Skylake, Kabylake Dependencies: Qemu's support is needed to implement the use cases of local display or remote display via SPICE protocol. Business value: improve user experience to get local display or remote display of vgpu. --- The dma-buf patches are merged by kernel 4.16 as well as some bug fixing patches, including: 47419494f216812b42f5d1c5a2984cd46253b4cc drm/i915/gvt: Use KVM r/w to access guest opregion 412718a10926f77052d8107cb3c5d9dbc96cf8c9 drm/i915/gvt: Keep obj->dma_buf link NULL during exporting 6ee942d5f7e3e630d3a2517e75969ce5d07c87d6 drm/i915/gvt: Refine dmabuf_obj cleanup process 82a3b6701ab1e2cdfb64cf163fc6d1a4576329ff drm/i915/gvt: Free dmabuf_obj list in intel_vgpu_dmabuf_cleanup 4a136d590bd4c579bb3df154363a3e5b51cb36ce drm/i915/gvt: Introduce KBL to dma-buf on Gvt-g dfb6ae4e14bd6542ee6caa8f661f269c94e19a9f drm/i915/gvt: Handle orphan dmabuf_objs e546e281d33d1fc275651aa06f0659045db67e68 drm/i915/gvt: Dmabuf support for GVT-g e20eaa2382e7888a4e06ccb015c476a6fb1fda0c vfio: ABI for mdev display dma-buf operation 9f31d1063b434c2d54317461d78285b08538c01a drm/i915/gvt: Add framebuffer decoder support b851adeac0858c7d257b32eee2142b1519d45ccf drm/i915/gvt: Add opregion support a03f395ad78f883df490234366dd4e4fc922d174 drm/i915: Introduce GEM proxy 274b2462a0493ba73957346fe5fca168e3190b53 drm/i915: Object w/o backing storage is banned by -ENXIO Currently, Gvt-g repo has three branches which have the dma-buf features: 1) staging branch Has GPU hang issue while booting Linux VM which can be solved by patch: https://lists.freedesktop.org/archives/intel-gvt-dev/2018-February/003039.html 2) Q1-release branch (gvt-stable-4.14) Still needs more tests. 3) topic/dmabuf This is a branch to show the idea of dma-buf. [Blog] We have a blog to talk about how to use dma-buf feature of Gvg-g and here is the link: https://01.org/igvt-g/blogs/wangbo85/2018/sharing-guest-framebuffer-host ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1749248 Title: gvt-g support local displays To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1749248/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1725390] Re: bits/libc-header-start.h: No such file
Hi @Joshua: Thanks for the reply. The 'make build' only build the xen binary. This also builds in my environment. This doesn't build the 'xen tools' (aka xl), which is necessary with every large step of Xen. The build breakage is in this tools area. The command: make build-tools will reproduce the issue quicker, without needing to 'make world'. -Paul -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1725390 Title: bits/libc-header-start.h: No such file To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1725390/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1735466] [NEW] FPGA phase 1
Private bug reported: Intel is introducing Field Programmable Array (FPGA) capabilities. The FPGA can be integrated into the Xeon package (MCP) or a discrete PCI bus device (DCP). The integrated on the CPU package (MCP) will be smaller capacity but faster. The PCI device (DCP) will be larger capacity but slower. Version-Release number of selected component (if applicable): Target Linux 4.11, Xen ?? ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel ** Description changed: Intel is introducing Field Programmable Array (FPGA) capabilities. The FPGA can be integrated into the Xeon package (MCP) or a discrete PCI bus device (DCP). The integrated on the CPU package (MCP) will be smaller capacity but faster. The PCI device (DCP) will be larger capacity but slower. Version-Release number of selected component (if applicable): - Target Linux 4.11 + Target Linux 4.11, Xen ?? ** Information type changed from Public to Private ** Tags added: intel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1735466 Title: FPGA phase 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735466/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1735468] [NEW] KVM SGX 1.0 + Launch Control
Private bug reported: SGX 1.5 (SGX1 + Flexible Launch Control) support Secure Guard Extensions (SGX) and Launch Control support for KVM. Launch Control allows support of external key management for SGX. Target Linux 4.14 ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel ** Tags added: intel ** Information type changed from Public to Private -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1735468 Title: KVM SGX 1.0 + Launch Control To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735468/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1735469] [NEW] Xen SGX 1.0 + Launch Control
Private bug reported: SGX 1.5 (SGX1 + Flexible Launch Control) support Secure Guard Extensions (SGX) and Launch Control support for KVM. Launch Control allows support of external key management for SGX. Target Xen 4.10 ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel ** Information type changed from Public to Private -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1735469 Title: Xen SGX 1.0 + Launch Control To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735469/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1735473] [NEW] kvm 5 level paging new EPT format
Private bug reported: The virtualization hardware is also changing with 5-level paging. This item is to track the work that needs to be done to update the EPT code, and also anything that has to be done for running mixed modes, like 5-level guests on 4-level kernels. Target Linux 4.14 (merged) d650014 KVM: x86: Fix the NULL pointer parameter in check_cr_write() fd8cb43 KVM: MMU: Expose the LA57 feature to VM. 855feb6 KVM: MMU: Add 5 level EPT & Shadow page table support. 2a7266a KVM: MMU: Rename PT64_ROOT_LEVEL to PT64_ROOT_4LEVEL. d1cd3ce KVM: MMU: check guest CR3 reserved bits based on its physical address width. e911eb3 KVM: x86: Add return value to kvm_cpuid(). ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel ** Information type changed from Public to Private -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1735473 Title: kvm 5 level paging new EPT format To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1735480] [NEW] Xen User Mode Instruction Prevention (UMIP)
Private bug reported: UMIP: User Mode Instruction Prevention, part of NIs User-Mode Instruction Prevetion feature could prevents a group of intructions(sgdt, sidt, sldt, smsw, and str) from being executed when CPL > 0(i.e. in user mode), if those instructions were executed when CPL, a general protection fault would be issued. UMIP could prevent userspace applications from accessing to system-wide settings such as the global or local descriptor tables, the segment selectors to the current task state and the local descriptor table. Hiding these system resources reduces the tools available to craft privilege escalation attacks. Target Xen 4.10. Xen: commit 293a0a1fd712b ("x86/cpufeatures: expose UMIP to HVM guests") XTF: commit 24635d9265e7 ("Functional: Add a UMIP test") ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel ** Information type changed from Public to Private -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1735480 Title: Xen User Mode Instruction Prevention (UMIP) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735480/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1735477] [NEW] KVM User Mode Instruction Prevention (UMIP)
Private bug reported: UMIP: User Mode Instruction Prevention, part of NIs User-Mode Instruction Prevetion feature could prevents a group of intructions(sgdt, sidt, sldt, smsw, and str) from being executed when CPL > 0(i.e. in user mode), if those instructions were executed when CPL, a general protection fault would be issued. UMIP could prevent userspace applications from accessing to system-wide settings such as the global or local descriptor tables, the segment selectors to the current task state and the local descriptor table. Hiding these system resources reduces the tools available to craft privilege escalation attacks. Target Linux 4.15. Am told it's merged, but commit id# not known. ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel ** Information type changed from Public to Private -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1735477 Title: KVM User Mode Instruction Prevention (UMIP) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735477/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1742488] [NEW] KVMGT gvt-g live migration
Public bug reported: KVMGT gvt-g Live Migration is a valuable feature for a variety of use cases like load balancing, hardware failover, energy saving and geographic migration. To enable VGPU live migration, one new region is designed for vfio_mdev device status save and restore during the migration. And one new ioctl is added to help do the mdev device dirty page synchronization. Correspondingly, GVT implements a function to save/retore the device context in the new region. Applied platform: BDW/SKL/KBL Business value: Improve efficiency and reduce cost in VM maintenance by enabling live migration for Intel GPU accelerated VM. ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1742488 Title: KVMGT gvt-g live migration To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1742488/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1745689] [NEW] Disable VM guest boot with '-no-acpi' on nvdimm systems
Public bug reported: Description of problem: Starting qemu-kvm with '-no-acpi' should fail on systems with nvdimm Environment: KVM:kvm-next-4.14.0_rc4-61d75077_4ffa88c9_20171113092427 Base OS: Fedora release 25 Guest OS: Fedora release 25 Platform: SKL-2S Reproduce steps: 1.Setup the AEP with 1-1-1 configuration on SKL-2S 2.Install Fedora25 on SKL host with ISO(Image path:http://linux-ftp.sh.intel.com/pub/mirrors/fedora/linux/releases/25/) 3.Create the guest with the command:qemu-system-x86_64 -enable-kvm -smp 8 -m 16G,slots=32,maxmem=96G -cpu host -device virtio-net-pci,netdev=nic0,mac=52:54:00:65:92:66 -netdev tap,id=nic0,script=/etc/kvm/qemu-ifup -drive file=/opt/sector.qcow2,if=virtio,id=virtio-disk0,format=qcow2 -M q35,nvdimm -object memory-backend-file,id=mem1,share,mem-path=/dev/pmem4,size=32G -device nvdimm,memdev=mem1,id=nv1,label-size=128k -no-acpi) Expect result: With no-acpi option, guest shall not be created, qemu report error, no host crash or call trace happens Actual result: Guest could bootup but the no pmem device under the /dev/ Fix is in qemu commit: 8cd91acec8 pc: fail memory hot-plug/unplug with -no-acpi and Q35 machine type ** Affects: xen (Ubuntu) Importance: Undecided Status: New ** Tags: intel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1745689 Title: Disable VM guest boot with '-no-acpi' on nvdimm systems To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1745689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1725390] [NEW] bits/libc-header-start.h: No such file
Public bug reported: OS: Ubuntu 17.10 gcc: gcc version 7.2.0 (Ubuntu 7.2.0-8ubuntu3) Trying to compile Xen 4.10-rc Steps to reproduce w/ Xen 4.10: configure make world Steps to reproduce quick test: root@pclaidev:/rhel-home/pclai/test/ubuntu17.10/stdint# make t.o cc -m32 -c -o t.o t.c In file included from /usr/lib/gcc/x86_64-linux-gnu/7/include/stdint.h:9:0, from t.c:1: /usr/include/stdint.h:26:10: fatal error: bits/libc-header-start.h: No such file or directory #include ^~ compilation terminated. : recipe for target 't.o' failed make: *** [t.o] Error 1 root@pclaidev:/rhel-home/pclai/test/ubuntu17.10/stdint# cat t.c #include root@pclaidev:/rhel-home/pclai/test/ubuntu17.10/stdint# gcc -v Using built-in specs. [snip] gcc version 7.2.0 (Ubuntu 7.2.0-8ubuntu3) root@pclaidev:/rhel-home/pclai/test/ubuntu17.10/stdint# ** Affects: xen (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1725390 Title: bits/libc-header-start.h: No such file To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1725390/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954465] [NEW] KVM AIA User IPI
Public bug reported: SENDUIPI is a new ring-3 instruction that sending IPI notification between ring 3 software. It uses a data structure (table) owned and managed by ring 0 OS. Ring 3 software can choose which table entry to invoke. Target Linux 5.18 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954465 Title: KVM AIA User IPI To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954465/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954464] [NEW] kvm SPR support for AMX
Public bug reported: AMX (including XFD): AMX (Advance Matrix eXtensions) is a new programming paradigm for direct matrix operations. TMUL (TILE Matrix mULtiply unit) is the multiply accelerator. XFD (Extended Feature Disable) is an XSAVE extension mechanism for those features with large XSAVE storage context, that enables the OS not pre-allocate the space initially. AMX is the first one using XFD feature. Use cases: Deep learning inference and training (CNN, DNN), other data analytics and machine learning apps, HPC SGEMM Target Linux 5.17 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954464 Title: kvm SPR support for AMX To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954464/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954463] [NEW] KVM ROP Control-Flow Enforcement Tech (CET)
Public bug reported: Control-Flow Enforcement Tech (CET) What is Intel CET: Control-flow Enforcement Technology (CET) provides protection against return/jump-oriented programming (ROP) attacks. It can be implemented to protect both the kernel and applications. In the first phase, only the user-mode protection is implemented on the 64-bit kernel. However, 32-bit applications are supported under the compatibility mode. CET includes shadow stack (SHSTK) and indirect branch tracking (IBT). The SHSTK is a secondary stack allocated from memory. The processor automatically pushes/pops a secure copy to the SHSTK every return address and, by comparing the secure copy to the program stack copy, verifies function returns are as intended. The IBT verifies all indirect CALL/JMP targets are intended and marked by the compiler with 'ENDBR' op codes. Why need this technology(CET VMX): CET also can provide ROP attack in guest OS with VMX HW support. This will enhance platform security in Cloud computing, it's meaningful for Cloud service providers. Key change in kvm: To enable KVM based CET feature for guest OS, we need to : 1) Expose the features(CET SHSTK/IBT) to guest OS via CPUID report. 2) Enable xsaves/xrstors support for guest OS. 3) Fix xsaves/xrstors issue in existing KVM code. 4) Enabled CET states loading in guest entry/exit. 5) Add CET VMX related definitions. Key change in Qemu-kvm: expose CET related CPUID and xsaves/xrstors support to guest. Target Linux 5.18 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New ** Package changed: xen (Ubuntu) => kvm (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954463 Title: KVM ROP Control-Flow Enforcement Tech (CET) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954463/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954468] [NEW] KVM Architectural LBRs
Public bug reported: Architectural LBRs (Last Branch Records) Architectural LBRs (Last Branch Records) enable recording of software path history by logging taken branches and other control flow transfers within model-specific registers, and is inherited from legacy LBR. If CPUID.(EAX=07H, ECX=0):EDX[19] is set to 1, the processor supports Architectural LBRs. With VMCS support and XSAVE support, the KVM guests could also use ARCH LBR as well. Target Linux 5.17 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954468 Title: KVM Architectural LBRs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954468/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954466] [NEW] KVM Protection Keys for Supervisor Pages (PKS)
Public bug reported: SKX introduced the Protection Key for User Pages (PKU) feature enabling fast, thread-specific manipulation of permission restrictions on user pages. SPR introduced Protection Key for Supervisor Pages(PKS), a new feature that extends the Protection Key architecture to support thread- specific permission restrictions on supervisor pages. This important feature enables enhanced access control on memory, and brings more valid usage model. Generally PKS enables protections on 'domains' of supervisor pages to limit supervisor mode access to pages beyond the normal paging protections(U/S, R/W, P). PKS works in a similar fashion to user space pkeys, PKU. As with PKU, supervisor pkeys are checked in addition to normal paging protections and Access or Writes can be disabled via a MSR update without TLB flushes when permissions change. PKS virtualization enabling should base on existing PKU code. Major works: CPUID exposure New CR4 bit exposure New VMCS fields enabling IA32_PKRS saving/restoring #GP handling Target Linux 5.19 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954466 Title: KVM Protection Keys for Supervisor Pages (PKS) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954466/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954469] [NEW] KVM Bus Lock Debug Exception
Public bug reported: A bus lock is acquired either through split locked access to writeback (WB) memory or by using locks to uncacheable (UC) memory. This is typically > 1000 cycles slower than atomic operation within a cache line. It also disrupts performance on other cores (which must wait for the bus lock to be released before their memory operations). Bus lock debug exception is a sub-feature of bus lock detection. It is an ability to notify the kernel by an #DB trap after the instruction acquires a bus lock when CPL>0. This allows the kernel to enforce user application throttling or mitigations. A logical processor can be configured to generate a debug exception (#DB) following acquisition of a bus lock. Software enables those debug exceptions by setting bit 2 of the IA32_DEBUGCTL MSR. The CPU enumerates this feature using CPUID.(EAX=7, ECX=0).ECX[24]. A debug exception due to acquistion of a bus lock is reported as a trap following execution of the instruction acquiring the bus lock. The processor identifies such debug exceptions using bit 11 of DR6: delivery of a bus-lock #DB clears DR6[11]. Linux 5.13 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954469 Title: KVM Bus Lock Debug Exception To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954469/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954471] [NEW] KVM AIA Work Dispatch Instructions
Public bug reported: AIA has 3 sub features: AIA User Interrupts AIA User Wait Instructions AIA Work Dispatch Instructions AIA User Wait Instructions was merged for SNR in Kernel 5.4/Qemu4.2. ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954471 Title: KVM AIA Work Dispatch Instructions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954472] [NEW] KVM Scalable I/O Virtualization
Public bug reported: Core OS/ VMM device virtualization framework extended to support Scalable IOV; OS/ VMM support for Scalable IOV IOMMU extensions; PASID translation support; existing device frameworks extended to support Scalable IOV; converged SW arch as prescribed by spec Improved performance and lower complexity for software utilizing PCIe devices in virtualized environments Software Benefits: Broad range of usages, e.g. security, comms, server graphics Target Linux 5.18 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954472 Title: KVM Scalable I/O Virtualization To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954472/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954473] [NEW] KVM Shared Virtual Memory (SVM)
Public bug reported: SVM is short for shared virtual memory. This task is aiming at enabling SVM support for assigned devices on KVM. Example: assign a GPU from host to guest, the application program running in guest could share its virtual memory address to the assigned device. Latest update: extend the vIOMMU in QEMU to support SVM feature. 1. Description of the Technology. SVM is shorted for Shared Virtual Memory, it is a VT-d feature that allows sharing application virtual address space with the I/O device. The feature works with the PCI sig Process Address Space ID (PASID). SVM has the following benefits: • Programmer gets a consistent view of memory across host application and device • Efficient access to data, avoiding pining or copying overheads 2. Use cases that is important for this technology (aka, why is this technology needed). Intel has multiple IPs that would support SVM, and the usage in guest is also a demand. e.g. QAT, it is usual to assign a QAT to guest and requires SVM to benefit from its advantages. 3. General design description (components modified: kvm, qemu-kvm, driver, libvirt (and other userland libraries)) Modified components would include: qemu-kvm, vfio driver, iommu driver Target Linux 5.19 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954473 Title: KVM Shared Virtual Memory (SVM) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954474] [NEW] KVM notify VM Exit
Public bug reported: A VMM can enable notification VM exits to occur if no interrupt windows occur in VMX non-root operation for a specified amount of time (notify window). KVM Enabling: enable bit 31 of secondary processor-based excution control. enable notification VM exit (exit reason 75) handler. expose a module param to configure notify window and disable/enable VM notify. Target Linux 5.17 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954474 Title: KVM notify VM Exit To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954466] Re: KVM Protection Keys for Supervisor Pages (PKS)
Thanks for correcting pkg names. No upstream commits yet. Target Linux 5.19 timeframe. Target Ubuntu 23.04. Platform is Sapphire Rapids -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954466 Title: KVM Protection Keys for Supervisor Pages (PKS) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954466/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954463] Re: KVM ROP Control-Flow Enforcement Tech (CET)
Thanks for correcting pkg names. No upstream commits yet. Target Linux 5.18 timeframe. Target Ubuntu 22.10. Platform is Sapphire Rapids. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954463 Title: KVM ROP Control-Flow Enforcement Tech (CET) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954463/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954465] Re: KVM AIA User IPI
Thanks for correcting pkg names. No upstream commits yet. Target Linux 5.18 timeframe. Target Ubuntu 22.10. Platform is Sapphire Rapids. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954465 Title: KVM AIA User IPI To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954465/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954464] Re: kvm SPR support for AMX
Thanks for correcting pkg names. No upstream commits yet. Target Linux 5.18 timeframe. Target Ubuntu 22.04. Platform is Sapphire Rapids. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954464 Title: kvm SPR support for AMX To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954464/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954473] Re: KVM Shared Virtual Memory (SVM)
Thanks for correcting pkg names. No upstream commits yet. Target Linux 5.19 timeframe. Target Ubuntu 23.04. Platform is Sapphire Rapids -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954473 Title: KVM Shared Virtual Memory (SVM) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954474] Re: KVM notify VM Exit
Thanks for correcting pkg names. No upstream commits yet. Target Linux 5.17 timeframe. Target Ubuntu 22.04. Platform is Sapphire Rapids -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954474 Title: KVM notify VM Exit To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954472] Re: KVM Scalable I/O Virtualization
Thanks for correcting pkg names. No upstream commits yet. Target Linux 5.18 timeframe. Target Ubuntu 22.10. Platform is Sapphire Rapids -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954472 Title: KVM Scalable I/O Virtualization To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954472/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954471] Re: KVM AIA Work Dispatch Instructions
Thanks for correcting pkg names. No upstream commits yet. Target Linux TBD. Platform is Sapphire Rapids -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954471 Title: KVM AIA Work Dispatch Instructions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954469] Re: KVM Bus Lock Debug Exception
in linux 5.13 e8ea85fb2 KVM: X86: Add support for the emulation of DR6_BUS_LOCK bit 76ea438b4 KVM: X86: Expose bus lock debug exception to guest qemu 6.1 06e878b41 target/i386: Add bus lock debug exception support -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1954469 Title: KVM Bus Lock Debug Exception To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954469/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956998] [NEW] kvm SGX numa support
Public bug reported: The basic SGX patches were merged into Qemu release, the left NUMA function for SGX should be enabled. The patch1 implemented the SGX NUMA ACPI to enable NUMA in the SGX guest. Since Libvirt need detailed host SGX EPC sections info to decide how to allocate EPC sections for SGX NUMA guest, the SGXEPCSection list is introduced to show detailed sections info in the monitor or HMP interface. Please help review this patchset, the link also can be found: https://github.com/intel/qemu-sgx upstream Platform: Ice Lake qemu 6.2 110581238 numa: Enable numa for SGX EPC sections 4755927ae numa: Support SGX numa in the monitor and Libvirt interfaces d1889b360 doc: Add the SGX numa description ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956998 Title: kvm SGX numa support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1956998/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1967894] [NEW] KVM IPI Virtualization support for SPR
Public bug reported: IPI virtualization targets to make the processor emulate the write to APIC registers that would send IPIs in virtualized system. VMX provide new VM-execution control and VMCS field to support IPI virtualization which can eliminate APIC-Write VM-exit. The processor sets the bit corresponding to the vector in target vCPU's PIR and may send a notification (IPI) specified by NDST and NV fields in target vCPU's PID. It is similar to what IOMMU engine does when dealing with posted interrupt from devices. IPI Virtualization is approved in SPR/EGS CCB and it is supposed to be enabled in C-step or later (perhaps D-step). Subject: Re: [PATCH v7 8/8] KVM: VMX: enable IPI virtualization https://lore.kernel.org/kvm/54df6da8-ad68-cc75-48db-d18fc8743...@intel.com/ Target Linux 5.18 ** Affects: kvm (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1967894 Title: KVM IPI Virtualization support for SPR To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1967894/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs