[Bug 1782205] Re: KVM SnowRidge enable new ISAs

2018-09-04 Thread Paul Lai
This is actually a KVM/qemu feature.  "Xen" part was autofilled.

qemu 3.0 commit 0da0fb062 x86/cpu: Enable CLDEMOTE(Demote Cache Line)
cpu feature

linux/kvm commit: 0ea3286e2d  KVM: x86: Expose CLDEMOTE CPU feature to
guest VM

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782205

Title:
  KVM SnowRidge enable new ISAs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1782205/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1790690] [NEW] KVM Crystal Ridge Lack of data persistence guarantee of QEMU writes to host PMEM

2018-09-04 Thread Paul Lai
Public bug reported:

When the host persistent memory is used as the backend of vNVDIMM, QEMU
itself may write to the host pmem, e.g., in vNVDIMM label emulation and
live migration. In those cases, QEMU needs to take necessary operations
(e.g., flush&fence after writes, or store with non-temporal hint) to
ensure the data persistence of its own writes to PMEM. Therefore, data
on vNVDIMM can be in a consistent status on abnormal termination of QEMU
(e.g., QEMU/host kernel crash, host power failure, etc.). Unfortunately,
such operations are missed in current QEMU implementation.

Here’s the list of qemu commits (from qemu 3.0):

56eb90a migration/ram: ensure write persistence on loading all data to PMEM.
469dd51 migration/ram: Add check and info message to nvdimm post copy.
faf8a13 mem/nvdimm: ensure write persistence to PMEM in label emulation
a4de855 hostmem-file: add the 'pmem' option
1782440 configure: add libpmem support
cbfc017 memory, exec: switch file ram allocation functions to 'flags' parameters
b0e5de9 memory, exec: Expose all memory block related flags.

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1790690

Title:
  KVM Crystal Ridge Lack of data persistence guarantee of QEMU writes to
  host PMEM

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1790690/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1857033] [NEW] qemu kvm add Cooper Lake cpu model

2019-12-19 Thread Paul Lai
Public bug reported:

This patchset is to add CPU model for intel processor Cooper Lake. It 
will inherit features from the existing CPU model Cascadelake-Server, 
meanwhile, add the platform associated new instruction and feature
for speculative execution which the host supports. There are associated
feature bit and macro defined here as needed.

https://lore.kernel.org/qemu-
devel/157089265511.19705.15924275646599772449@37313f22b938/T/


in post (yet untagged) qemu-4.2.0
77b168d221191156c47fcd8d1c47329dfdb9439e  i386: Add MSR feature bit for MDS-NO
5af514d0cb314f43bc53f2aefb437f6451d64d0c  i386: Add macro for stibp
22a866b6166db5caa4abaa6e656c2a431fa60726  i386: Add new CPU model Cooperlake

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1857033

Title:
  qemu kvm add Cooper Lake cpu model

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1857033/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782206] Re: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)

2019-09-30 Thread Paul Lai
Additional KVM patches has been merged (post 5.3-rc8):

e69e72faa3a KVM: x86: Add support for user wait instructions
6e3ba4abcea KVM: vmx: Emulate MSR IA32_UMWAIT_CONTROL
bf653b78f96 KVM: vmx: Introduce handle_unexpected_vmexit and handle WAITPKG 
vmexit

[There's no Xen AIA work (yet)]

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782206

Title:
  KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782206/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1829760] [NEW] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

2019-05-20 Thread Paul Lai
Public bug reported:

Description of problem:
[KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

How reproducible:
Upstream always, Ubuntu unknown.

Steps to Reproduce:
1. Boot up guest using: -cpu Cascadelake-Server 

[root@clx-2s2 yexin]# qemu-system-x86_64 -accel kvm -drive
if=virtio,id=hd,file=/home/yexin/rhel7u6.qcow2,format=qcow2  -m 4096
-smp 4 -cpu Cascadelake-Server -serial stdio

char device redirected to /dev/pts/3 (label serial0)

qemu-system-x86_64: warning: host doesn't support requested feature:
CPUID.07H:ECX [bit 4]

qemu-system-x86_64: warning: host doesn't support requested feature:
CPUID.07H:ECX [bit 4]

qemu-system-x86_64: warning: host doesn't support requested feature:
CPUID.07H:ECX [bit 4]

qemu-system-x86_64: warning: host doesn't support requested feature:
CPUID.07H:ECX [bit 4]

2. To check CPU ID related to features[FEAT_7_0_EDX]
:CPUID_7_0_EDX_ARCH_CAPABILITIES

Actual results:
Host's cpuid: 0x0007 0x00: eax=0x ebx=0xd39b ecx=0x0818 
edx=0xbc00  (EDX bit 29=1)

Guest's cpuid : 0x0007 0x00: eax=0x ebx=0xd19f0fb9
ecx=0x0818 edx=0x8400 (EDX bit 29=0)

Expected results:
Both host and guest's CPUID.07H EDX bit 29 should be 1.

Additional info:
Upstream 5.0 fixed, commit:
2bdb76c015df7125783d8394d6339d181cb5bc30


Kernel:
commit 2bdb76c015df7125783d8394d6339d181cb5bc30
Author: Xiaoyao Li 
Date:   Fri Mar 8 15:57:20 2019 +0800
kvm/x86: Move MSR_IA32_ARCH_CAPABILITIES to array emulated_msrs

commit 0cf9135b773bf32fba9dd8e6699c1b331ee4b749
Author: Sean Christopherson 
Date:   Thu Mar 7 15:43:02 2019 -0800

KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts

QEMU:
 
commit 014018e19b3c54dd1bf5072bc912ceffea40abe8
Author: Eduardo Habkost 
Date:   Fri Jan 25 20:06:06 2019 -0200
   i386: Make arch_capabilities migratable
 
commit 485b1d256bcb0874bcde0223727c159b6837e6f8
Author: Eduardo Habkost 
Date:   Fri Jan 25 20:06:05 2019 -0200
   i386: kvm: Disable arch_capabilities if MSR can't be set
 
commit b0a1980384fc265d91de7e09aa5fe531a69e6288
Author: Tao Xu 
Date:   Thu Dec 27 10:43:03 2018 +0800
   i386: Update stepping of Cascadelake-Server
 
commit aec5e9c3a94cf8b7920f59bef69a6f426092c4a0
Author: Bandan Das 
Date:   Sun Nov 25 23:17:28 2018 -0500
   kvm: Use KVM_GET_MSR_INDEX_LIST for MSR_IA32_ARCH_CAPABILITIES support
 
commit 07585923485952bf4cb7da563c9f91fecc85d09c
Author: Robert Hoo 
Date:   Mon Oct 15 12:47:24 2018 +0800
   x86: Data structure changes to support MSR based features
 
commit f57bceb6ab5163ddd6c41ff4344ab8cf28a9c63d
Author: Robert Hoo 
Date:   Mon Oct 15 12:47:23 2018 +0800
   kvm: Add support to KVM_GET_MSR_FEATURE_INDEX_LIST and KVM_GET_MSRS system 
ioctl
 
commit d86f963694df27f11b3681ffd225c9362de1b634
Author: Robert Hoo 
Date:   Mon Oct 15 12:47:25 2018 +0800
   x86: define a new MSR based feature word – FEATURE_WORDS_ARCH_CAPABILITIES
 
commit c7a88b52f62b30c04158eeb07f73e3f72221b6a8
Author: Tao Xu 
Date:   Wed Sep 19 11:11:22 2018 +0800
   i386: Add new model of Cascadelake-Server
 
commit 3fc7c73139d2d38ae80c3b0bc963b1ac1555924c
Author: Robert Hoo 
Date:   Thu Jul 5 17:09:55 2018 +0800
   i386: Add CPUID bit and feature words for IA32_ARCH_CAPABILITIES MSR
 
commit 8a11c62da9146dd89aee98947e6bd831e65a970d
Author: Robert Hoo 
Date:   Thu Jul 5 17:09:58 2018 +0800
   i386: Add new CPU model Icelake-{Server,Client}
 
commit 8c80c99fcceabd0708a5a83f08577e778c9419f5
Author: Robert Hoo 
Date:   Thu Jul 5 17:09:54 2018 +0800
   i386: Add new MSR indices for IA32_PRED_CMD and IA32_ARCH_CAPABILITIES

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1829760

Title:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1829760/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1829760] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

2019-05-21 Thread Paul Lai
Yes, this is qemu/kvm, not xen.  Strange, I thought I filed it against
kvm.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1829760

Title:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1829760/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

RE: [Bug 1829760] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

2019-05-22 Thread Paul Lai
*** This bug is a duplicate of bug 1828495 ***
https://bugs.launchpad.net/bugs/1828495

No reason not to dup.  Did not find 1828495 before writing 1829760

-Original Message-
From: boun...@canonical.com [mailto:boun...@canonical.com] On Behalf Of Dan 
Streetman
Sent: Tuesday, May 21, 2019 1:04 PM
To: Lai, Paul C 
Subject: [Bug 1829760] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not 
enabled in VM. 

note bug 1828495...even the description appears taken from that bug.  is
there a reason this isn't a dup?

--
You received this bug notification because you are subscribed to the bug report.
https://bugs.launchpad.net/bugs/1829760

Title:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

Status in qemu package in Ubuntu:
  New

Bug description:
  Description of problem:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

  How reproducible:
  Upstream always, Ubuntu unknown.

  Steps to Reproduce:
  1. Boot up guest using: -cpu Cascadelake-Server 

  [root@clx-2s2 yexin]# qemu-system-x86_64 -accel kvm -drive
  if=virtio,id=hd,file=/home/yexin/rhel7u6.qcow2,format=qcow2  -m 4096
  -smp 4 -cpu Cascadelake-Server -serial stdio

  char device redirected to /dev/pts/3 (label serial0)

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  2. To check CPU ID related to features[FEAT_7_0_EDX]
  :CPUID_7_0_EDX_ARCH_CAPABILITIES

  Actual results:
  Host's cpuid: 0x0007 0x00: eax=0x ebx=0xd39b ecx=0x0818 
edx=0xbc00  (EDX bit 29=1)

  Guest's cpuid : 0x0007 0x00: eax=0x ebx=0xd19f0fb9
  ecx=0x0818 edx=0x8400 (EDX bit 29=0)

  Expected results:
  Both host and guest's CPUID.07H EDX bit 29 should be 1.

  Additional info:
  Upstream 5.0 fixed, commit:
  2bdb76c015df7125783d8394d6339d181cb5bc30

  
  Kernel:
  commit 2bdb76c015df7125783d8394d6339d181cb5bc30
  Author: Xiaoyao Li 
  Date:   Fri Mar 8 15:57:20 2019 +0800
  kvm/x86: Move MSR_IA32_ARCH_CAPABILITIES to array emulated_msrs

  commit 0cf9135b773bf32fba9dd8e6699c1b331ee4b749
  Author: Sean Christopherson 
  Date:   Thu Mar 7 15:43:02 2019 -0800

  KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hosts

  QEMU:
   
  commit 014018e19b3c54dd1bf5072bc912ceffea40abe8
  Author: Eduardo Habkost 
  Date:   Fri Jan 25 20:06:06 2019 -0200
 i386: Make arch_capabilities migratable
   
  commit 485b1d256bcb0874bcde0223727c159b6837e6f8
  Author: Eduardo Habkost 
  Date:   Fri Jan 25 20:06:05 2019 -0200
 i386: kvm: Disable arch_capabilities if MSR can't be set
   
  commit b0a1980384fc265d91de7e09aa5fe531a69e6288
  Author: Tao Xu 
  Date:   Thu Dec 27 10:43:03 2018 +0800
 i386: Update stepping of Cascadelake-Server
   
  commit aec5e9c3a94cf8b7920f59bef69a6f426092c4a0
  Author: Bandan Das 
  Date:   Sun Nov 25 23:17:28 2018 -0500
 kvm: Use KVM_GET_MSR_INDEX_LIST for MSR_IA32_ARCH_CAPABILITIES support
   
  commit 07585923485952bf4cb7da563c9f91fecc85d09c
  Author: Robert Hoo 
  Date:   Mon Oct 15 12:47:24 2018 +0800
 x86: Data structure changes to support MSR based features
   
  commit f57bceb6ab5163ddd6c41ff4344ab8cf28a9c63d
  Author: Robert Hoo 
  Date:   Mon Oct 15 12:47:23 2018 +0800
 kvm: Add support to KVM_GET_MSR_FEATURE_INDEX_LIST and KVM_GET_MSRS system 
ioctl
   
  commit d86f963694df27f11b3681ffd225c9362de1b634
  Author: Robert Hoo 
  Date:   Mon Oct 15 12:47:25 2018 +0800
 x86: define a new MSR based feature word – FEATURE_WORDS_ARCH_CAPABILITIES
   
  commit c7a88b52f62b30c04158eeb07f73e3f72221b6a8
  Author: Tao Xu 
  Date:   Wed Sep 19 11:11:22 2018 +0800
 i386: Add new model of Cascadelake-Server
   
  commit 3fc7c73139d2d38ae80c3b0bc963b1ac1555924c
  Author: Robert Hoo 
  Date:   Thu Jul 5 17:09:55 2018 +0800
 i386: Add CPUID bit and feature words for IA32_ARCH_CAPABILITIES MSR
   
  commit 8a11c62da9146dd89aee98947e6bd831e65a970d
  Author: Robert Hoo 
  Date:   Thu Jul 5 17:09:58 2018 +0800
 i386: Add new CPU model Icelake-{Server,Client}
   
  commit 8c80c99fcceabd0708a5a83f08577e778c9419f5
  Author: Robert Hoo 
  Date:   Thu Jul 5 17:09:54 2018 +0800
 i386: Add new MSR indices for IA32_PRED_CMD and IA32_ARCH_CAPABILITIES

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1829760/+subscriptions

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1829760

Title:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1829760/+subscript

[Bug 1828495] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

2019-06-03 Thread Paul Lai
This patch is also needed for kernels before 4.18

  cd28325249 KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature
MSR ( 25-6-18)

This patchset populates the structure in arch/x86/kvm/x86.c:
   msr_based_features{}

With out this patch, qemu asserts at

  kvm_get_supported_feature_msrs(KVMState *s):
 assert(msr_list.nmsrs > 0);

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1828495

Title:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1828495/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782206] Re: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)

2019-10-29 Thread Paul Lai
qemu post 4.1.0 (yet untagged)
67192a298f5 x86/cpu: Add support for UMONITOR/UMWAIT/TPAUSE
6508799707b target/i386: Add support for save/load IA32_UMWAIT_CONTROL MSR

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782206

Title:
  KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782206/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782206] Re: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)

2019-03-20 Thread Paul Lai
33823f4d6 x86/cpufeatures: Enumerate MOVDIRI instruction
ace6485a0 x86/cpufeatures: Enumerate MOVDIR64B instruction
65e259d5c tools arch x86: Update tools's copy of cpufeatures.h

(linux 5.1-rc1)
74f2370bb KVM: x86: expose MOVDIRI CPU feature into VM.
c029b5deb KVM: x86: expose MOVDIR64B CPU feature into VM.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782206

Title:
  KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782206/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782209] Re: KVM SnowRidge Split-lock disable

2019-05-07 Thread Paul Lai
Related QEMU patch can be found at:

https://lists.gnu.org/archive/html/qemu-devel/2019-03/msg00507.html

and related kvm-unit-test can be found at:

https://patchwork.kernel.org/patch/10837677/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782209

Title:
  KVM SnowRidge Split-lock disable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782209/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782206] Re: KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)

2019-05-07 Thread Paul Lai
Chris: a little of both.  The UMONITOR/UMWAIT/TPAUSE is delay, but the
rest has been upstreamed (as you already noted.)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782206

Title:
  KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782206/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

RE: [Bug 1782208] Re: KVM SnowRidge Adaptive PEBS

2019-05-07 Thread Paul Lai
No updates/upstream at this time.

-Original Message-
From: boun...@canonical.com [mailto:boun...@canonical.com] On Behalf Of 
Christian Ehrhardt ?
Sent: Monday, May 6, 2019 10:29 PM
To: Lai, Paul C 
Subject: [Bug 1782208] Re: KVM SnowRidge Adaptive PEBS

Are there updates and/or references to commits in those projects already
that we can use to track and integrate those features?

--
You received this bug notification because you are subscribed to the bug report.
https://bugs.launchpad.net/bugs/1782208

Title:
  KVM SnowRidge Adaptive PEBS

Status in linux package in Ubuntu:
  Incomplete
Status in qemu package in Ubuntu:
  New
Status in xen package in Ubuntu:
  New

Bug description:
  With the addition of more CPU state information of data, the PEBS(Processor 
Event Based Sampling) record size is greatly increased. However, most general 
users of PEBS require just the eventingIP and do not require such a large PEBS 
record.
   Adaptive PEBS provides Software the capability to configure the PEBS records 
to capture only the data of interest, keeping the record size compact.
   Need modify KVM and Qemu.

  Adaptive PEBS (Processor Event Based Sampling) is configurable PEBS records 
for only interested data collection from massive PEBS data. It depends on PEBS 
via PT. The enabling work includes:
  ◾Expose this feature and MSR configure bit in guest PEBS driver
  ◾Save and restore status in vCPU when vm_exit and vm_entry
  ◾Support both host-guest mode and system mode.

  Target Kernel: 5.2
  Target Release: 19.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782208/+subscriptions

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782208

Title:
  KVM SnowRidge Adaptive PEBS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1782208/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782205] [NEW] KVM SnowRidge enable new ISAs

2018-07-17 Thread Paul Lai
Public bug reported:

Add KVM support for SnowRidge New Instructions: GFNI and CLDEMOT

GFNI: New instruction to compute an affine transformation in the Galois Field. 
 The instruction is described here:
https://software.intel.com/sites/default/files/managed/c5/15/architecture-instruction-set-extensions-programming-reference.pdf
 

CLDEMOT: New instruction to hint to hardware that a cache line is likely
to be shared. This is used to improve core-to-core communication.

Upstream Target is Linux 4.20

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782205

Title:
  KVM SnowRidge enable new ISAs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1782205/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782207] [NEW] KVM SnowRidge Processor Trace v4

2018-07-17 Thread Paul Lai
Public bug reported:

The PEBS(Processor Event Based Sampling) facility allows software to profile 
workload behavior by periodically capturing machine state, memory access 
information and other groups of architectural information. In native systems, 
PEBS uses a debug store mechanism to store a set of architectural state 
information for the processor and we need to specify a linear pages for the 
output buffer which must be pinned to physical pages. In virtualized systems, 
pinning the platform physical pages for the output buffer is difficult. 
 PT V4 provide a method to format PEBS sampling data to new type of trace 
packet and output to Intel Processor Trace buffer. This depend on 
PT-VMX(Enabling use of EPT to redirect PT output)which enabled in ICX platform.
 Need modify in KVM and Qemu.

Intel Processor Trace v4 task list:
◾PT VMX which is done and in upstream phase, and need more review and update 
effort
◾PEBS via PT on SNR. It's new added task, which target to ww48
◾PT PEBS/EMON integration. This feature allows PEBS data to be written into PT 
output channel, leveraging PT Virtualization work for PEBS.
◾cpuid support and context switch
◾Support host-guest mode and system mode
 More Open feature includes Live Migration support and LBR support

Upstream target Linux 4.20

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782207

Title:
  KVM SnowRidge Processor Trace v4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1782207/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782208] [NEW] KVM SnowRidge Adaptive PEBS

2018-07-17 Thread Paul Lai
Public bug reported:

With the addition of more CPU state information of data, the PEBS(Processor 
Event Based Sampling) record size is greatly increased. However, most general 
users of PEBS require just the eventingIP and do not require such a large PEBS 
record. 
 Adaptive PEBS provides Software the capability to configure the PEBS records 
to capture only the data of interest, keeping the record size compact. 
 Need modify KVM and Qemu.

Adaptive PEBS (Processor Event Based Sampling) is configurable PEBS records for 
only interested data collection from massive PEBS data. It depends on PEBS via 
PT. The enabling work includes:
◾Expose this feature and MSR configure bit in guest PEBS driver
◾Save and restore status in vCPU when vm_exit and vm_entry
◾Support both host-guest mode and system mode.

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782208

Title:
  KVM SnowRidge Adaptive PEBS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1782208/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782206] [NEW] KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)

2018-07-17 Thread Paul Lai
Public bug reported:

CPU core (Tremont) includes Accelerator Interfacing Architecture (AIA) features 
including:
- UMONITOR/UMWAIT: Ring-3 MONITOR/MWAIT with timeout. For memory-based synch 
with accelerators
- TPAUSE: Monitor-less wait (with timeout). For wait-on-multiple or 
wait-for-interrupt usages
- MOVDIRI: 8B streaming doorbell write capability. For streaming accelerator 
usages.
- MOVDIR64B: Non-temporal write with 64B guaranteed write-atomicity. For 
latency critical accelerator usages

Upstream target linux 4.20

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782206

Title:
  KVM enable SnowRidge Accelerator Interfacing Architecture (AIA)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1782206/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782209] [NEW] KVM SnowRidge Split-lock disable

2018-07-17 Thread Paul Lai
Public bug reported:

When bit 29 is set in Test Control MSR register 0x33, a #AC execption
 is generated for split locked accesses at all CPL irrespective of
 CR0.AM or EFLAGS.AC.

This feature can help developers to capture memory accesses that across
cachelines with #LOCK assertion. Then developers can reconstruct their
program accordingly

Upstream target linux 4.20

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

** Package changed: xen (Ubuntu) => kvm (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782209

Title:
  KVM SnowRidge Split-lock disable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1782209/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782212] [NEW] KVM CLX ACPI HMAT table support

2018-07-17 Thread Paul Lai
Public bug reported:

ACPI HMAT table support : HMAT is a new ACPI table that records the
performance parameter of memory, so MCDRAM (or next gen HBM2) can be
described well by this table. We need to support this table in kernel
and qemu so that guest can get and parse this table then to find where
the high-performance memory is.

Heterogeneous Memory Attribute Table (HMAT) describes the memory attributes, 
such as memory
 side cache attributes and bandwidth and latency details, related to the System 
Physical Address
 (SPA) Memory Ranges. The software is expected to use this information as hint 
for optimization.

HMAT is defined in ACPI 6.2: 5.2.27 Heterogeneous Memory Attribute Table (HMAT).
http://www.uefi.org/sites/default/files/resources/ACPI_6_2.pdf
 patches:
http://lists.nongnu.org/archive/html/qemu-devel/2018-06/msg05368.html

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782212

Title:
  KVM CLX ACPI HMAT table support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1782212/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1782212] Re: KVM CLX ACPI HMAT table support

2018-07-17 Thread Paul Lai
Upstream target Linux 4.20

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782212

Title:
  KVM CLX ACPI HMAT table support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1782212/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1739665] [NEW] [Feature] KVM CLX avx512_vnni

2017-12-21 Thread Paul Lai
Public bug reported:

This feature has been released in ICX platform and the definition of 
AVX512_VNNI as below
 AVX512_VNNI Vector Nerual Network Instructions, an addition to AVX512. 
cpuid.(7,0). ECX[11]

This is a new instruction to support machine learning. This instructions
is pure HW features, currently, there is no test cases for this new
instruction, we only check CPUID info by cpuid tool.

target kernel 4.16

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1739665

Title:
  [Feature] KVM CLX avx512_vnni

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1739665/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1725390] Re: bits/libc-header-start.h: No such file

2017-12-26 Thread Paul Lai
I re-installed 17.10 and cannot reproduce the issue.

Thanks for the words.  Marked bug "Invalid"

** Changed in: xen (Ubuntu)
   Status: Incomplete => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1725390

Title:
  bits/libc-header-start.h: No such file

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1725390/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1674587] Re: [HPC, KNM][Xen] avx512_4vnniw, avx512_4fmaps enabling

2017-08-22 Thread Paul Lai
If memory serves, Xen 4.9 is in Artful.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1674587

Title:
  [HPC, KNM][Xen] avx512_4vnniw, avx512_4fmaps enabling

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1674587/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1749248] [NEW] gvt-g support local displays

2018-02-13 Thread Paul Lai
Public bug reported:

Feature description: dma-buf is an uniform mechanism to share DMA buffers 
across different devices and subsystems. dma-buf for intel GVT-g is mainly used 
to share the vgpu's framebuffer to userspace to leverage userspace graphics 
stacks to render the framebuffer to the display monitor.
 The main idea is that we create a gem object and set vgpu's framebuffer as its 
backing storage. Then, export a dma-buf associated with this gem object. With 
the fd of this dma-buf, userspace can directly handle this buffer.

Applied platform: Skylake, Kabylake

Dependencies: Qemu's support is needed to implement the use cases of
local display or remote display via SPICE protocol.

Business value: improve user experience to get local display or remote
display of vgpu.

---

The dma-buf patches are merged by kernel 4.16 as well as some bug fixing 
patches, including:
 47419494f216812b42f5d1c5a2984cd46253b4cc drm/i915/gvt: Use KVM r/w to access 
guest opregion
 412718a10926f77052d8107cb3c5d9dbc96cf8c9 drm/i915/gvt: Keep obj->dma_buf link 
NULL during exporting
 6ee942d5f7e3e630d3a2517e75969ce5d07c87d6 drm/i915/gvt: Refine dmabuf_obj 
cleanup process
 82a3b6701ab1e2cdfb64cf163fc6d1a4576329ff drm/i915/gvt: Free dmabuf_obj list in 
intel_vgpu_dmabuf_cleanup
 4a136d590bd4c579bb3df154363a3e5b51cb36ce drm/i915/gvt: Introduce KBL to 
dma-buf on Gvt-g
 dfb6ae4e14bd6542ee6caa8f661f269c94e19a9f drm/i915/gvt: Handle orphan 
dmabuf_objs
 e546e281d33d1fc275651aa06f0659045db67e68 drm/i915/gvt: Dmabuf support for GVT-g
 e20eaa2382e7888a4e06ccb015c476a6fb1fda0c vfio: ABI for mdev display dma-buf 
operation
 9f31d1063b434c2d54317461d78285b08538c01a drm/i915/gvt: Add framebuffer decoder 
support
 b851adeac0858c7d257b32eee2142b1519d45ccf drm/i915/gvt: Add opregion support
 a03f395ad78f883df490234366dd4e4fc922d174 drm/i915: Introduce GEM proxy
 274b2462a0493ba73957346fe5fca168e3190b53 drm/i915: Object w/o backing storage 
is banned by -ENXIO

Currently, Gvt-g repo has three branches which have the dma-buf features:
 1) staging branch
 Has GPU hang issue while booting Linux VM which can be solved by patch:
https://lists.freedesktop.org/archives/intel-gvt-dev/2018-February/003039.html
 2) Q1-release branch (gvt-stable-4.14)
 Still needs more tests.
 3) topic/dmabuf
 This is a branch to show the idea of dma-buf.

[Blog]
 We have a blog to talk about how to use dma-buf feature of Gvg-g and here is 
the link:
https://01.org/igvt-g/blogs/wangbo85/2018/sharing-guest-framebuffer-host

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749248

Title:
  gvt-g support local displays

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1749248/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1725390] Re: bits/libc-header-start.h: No such file

2017-11-27 Thread Paul Lai
Hi @Joshua:

Thanks for the reply.  The 'make build' only build the xen binary.  This
also builds in my environment.  This doesn't build the 'xen tools' (aka
xl), which is necessary with every large step of Xen.  The build
breakage is in this tools area.

The command:
  make build-tools
will reproduce the issue quicker, without needing to 'make world'.

-Paul

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1725390

Title:
  bits/libc-header-start.h: No such file

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1725390/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1735466] [NEW] FPGA phase 1

2017-11-30 Thread Paul Lai
Private bug reported:

Intel is introducing Field Programmable Array (FPGA) capabilities. The
FPGA can be integrated into the Xeon package (MCP) or a discrete PCI bus
device (DCP).  The integrated on the CPU package (MCP) will be smaller
capacity but faster.  The PCI device (DCP) will be larger capacity but
slower.

Version-Release number of selected component (if applicable):
  Target Linux 4.11, Xen ??

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

** Description changed:

  Intel is introducing Field Programmable Array (FPGA) capabilities. The
  FPGA can be integrated into the Xeon package (MCP) or a discrete PCI bus
  device (DCP).  The integrated on the CPU package (MCP) will be smaller
  capacity but faster.  The PCI device (DCP) will be larger capacity but
  slower.
  
  Version-Release number of selected component (if applicable):
-   Target Linux 4.11
+   Target Linux 4.11, Xen ??

** Information type changed from Public to Private

** Tags added: intel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1735466

Title:
  FPGA phase 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735466/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1735468] [NEW] KVM SGX 1.0 + Launch Control

2017-11-30 Thread Paul Lai
Private bug reported:

SGX 1.5 (SGX1 + Flexible Launch Control) support

Secure Guard Extensions (SGX) and Launch Control support for KVM.
Launch Control allows support of external key management for SGX.

Target Linux 4.14

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

** Tags added: intel

** Information type changed from Public to Private

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1735468

Title:
  KVM SGX 1.0 + Launch Control

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735468/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1735469] [NEW] Xen SGX 1.0 + Launch Control

2017-11-30 Thread Paul Lai
Private bug reported:

SGX 1.5 (SGX1 + Flexible Launch Control) support

Secure Guard Extensions (SGX) and Launch Control support for KVM.
Launch Control allows support of external key management for SGX.

Target Xen 4.10

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

** Information type changed from Public to Private

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1735469

Title:
  Xen SGX 1.0 + Launch Control

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735469/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1735473] [NEW] kvm 5 level paging new EPT format

2017-11-30 Thread Paul Lai
Private bug reported:

The virtualization hardware is also changing with 5-level paging. This
item is to track the work that needs to be done to update the EPT code,
and also anything that has to be done for running mixed modes, like
5-level guests on 4-level kernels.

Target Linux 4.14 (merged)

 d650014 KVM: x86: Fix the NULL pointer parameter in check_cr_write()
 fd8cb43 KVM: MMU: Expose the LA57 feature to VM.
 855feb6 KVM: MMU: Add 5 level EPT & Shadow page table support.
 2a7266a KVM: MMU: Rename PT64_ROOT_LEVEL to PT64_ROOT_4LEVEL.
 d1cd3ce KVM: MMU: check guest CR3 reserved bits based on its physical address 
width.
 e911eb3 KVM: x86: Add return value to kvm_cpuid().

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

** Information type changed from Public to Private

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1735473

Title:
  kvm 5 level paging new EPT format

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735473/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1735480] [NEW] Xen User Mode Instruction Prevention (UMIP)

2017-11-30 Thread Paul Lai
Private bug reported:

UMIP: User Mode Instruction Prevention, part of NIs

User-Mode Instruction Prevetion feature could prevents a group of
intructions(sgdt, sidt, sldt, smsw, and str) from being executed when
CPL > 0(i.e. in user mode), if those instructions were executed when
CPL, a general protection fault would be issued.

UMIP could prevent userspace applications from accessing to system-wide
settings such as the global or local descriptor tables, the segment
selectors to the current task state and the local descriptor table.
Hiding these system resources reduces the tools available to craft
privilege escalation attacks.

Target Xen 4.10.

Xen: commit 293a0a1fd712b ("x86/cpufeatures: expose UMIP to HVM guests")
XTF: commit 24635d9265e7 ("Functional: Add a UMIP test")

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

** Information type changed from Public to Private

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1735480

Title:
  Xen User Mode Instruction Prevention (UMIP)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735480/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1735477] [NEW] KVM User Mode Instruction Prevention (UMIP)

2017-11-30 Thread Paul Lai
Private bug reported:

UMIP: User Mode Instruction Prevention, part of NIs

User-Mode Instruction Prevetion feature could prevents a group of
intructions(sgdt, sidt, sldt, smsw, and str) from being executed when
CPL > 0(i.e. in user mode), if those instructions were executed when
CPL, a general protection fault would be issued.

UMIP could prevent userspace applications from accessing to system-wide
settings such as the global or local descriptor tables, the segment
selectors to the current task state and the local descriptor table.
Hiding these system resources reduces the tools available to craft
privilege escalation attacks.

Target Linux 4.15.  Am told it's merged, but commit id# not known.

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

** Information type changed from Public to Private

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1735477

Title:
  KVM User Mode Instruction Prevention (UMIP)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1735477/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1742488] [NEW] KVMGT gvt-g live migration

2018-01-10 Thread Paul Lai
Public bug reported:

KVMGT gvt-g Live Migration is a valuable feature for a variety of use
cases like load balancing, hardware failover, energy saving and
geographic migration. To enable VGPU live migration, one new region is
designed for vfio_mdev device status save and restore during the
migration. And one new ioctl is added to help do the mdev device dirty
page synchronization. Correspondingly, GVT implements a function to
save/retore the device context in the new region.

Applied platform: BDW/SKL/KBL

Business value: Improve efficiency and reduce cost in VM maintenance by
enabling live migration for Intel GPU accelerated VM.

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1742488

Title:
  KVMGT gvt-g live migration

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1742488/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1745689] [NEW] Disable VM guest boot with '-no-acpi' on nvdimm systems

2018-01-26 Thread Paul Lai
Public bug reported:

Description of problem:
  Starting qemu-kvm with '-no-acpi' should fail on systems with nvdimm 

Environment:
KVM:kvm-next-4.14.0_rc4-61d75077_4ffa88c9_20171113092427
Base OS: Fedora release 25
Guest OS: Fedora release 25
Platform: SKL-2S

Reproduce steps:
1.Setup the AEP with 1-1-1 configuration on SKL-2S
2.Install Fedora25 on SKL host with ISO(Image 
path:http://linux-ftp.sh.intel.com/pub/mirrors/fedora/linux/releases/25/)
3.Create the guest with the command:qemu-system-x86_64 -enable-kvm -smp 8 -m 
16G,slots=32,maxmem=96G -cpu host -device 
virtio-net-pci,netdev=nic0,mac=52:54:00:65:92:66 -netdev 
tap,id=nic0,script=/etc/kvm/qemu-ifup -drive 
file=/opt/sector.qcow2,if=virtio,id=virtio-disk0,format=qcow2 -M q35,nvdimm 
-object memory-backend-file,id=mem1,share,mem-path=/dev/pmem4,size=32G -device 
nvdimm,memdev=mem1,id=nv1,label-size=128k -no-acpi)

Expect result:
With no-acpi option, guest shall not be created, qemu report error, no host 
crash or call trace happens
Actual result:
Guest could bootup but the no pmem device under the /dev/


Fix is in qemu commit:
  8cd91acec8  pc: fail memory hot-plug/unplug with -no-acpi and Q35 machine type

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: intel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1745689

Title:
   Disable VM guest boot with '-no-acpi' on nvdimm systems

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1745689/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1725390] [NEW] bits/libc-header-start.h: No such file

2017-10-20 Thread Paul Lai
Public bug reported:

OS: Ubuntu 17.10
gcc: gcc version 7.2.0 (Ubuntu 7.2.0-8ubuntu3) 

Trying to compile Xen 4.10-rc

Steps to reproduce w/ Xen 4.10:
  configure 
  make world

Steps to reproduce quick test:

  root@pclaidev:/rhel-home/pclai/test/ubuntu17.10/stdint# make t.o
  cc -m32   -c -o t.o t.c
  In file included from /usr/lib/gcc/x86_64-linux-gnu/7/include/stdint.h:9:0,
   from t.c:1:
  /usr/include/stdint.h:26:10: fatal error: bits/libc-header-start.h: No such 
file or directory
   #include 
^~
  compilation terminated.
  : recipe for target 't.o' failed
  make: *** [t.o] Error 1
  
root@pclaidev:/rhel-home/pclai/test/ubuntu17.10/stdint# cat t.c
  #include 

  root@pclaidev:/rhel-home/pclai/test/ubuntu17.10/stdint# gcc -v
  Using built-in specs.
  [snip]
  gcc version 7.2.0 (Ubuntu 7.2.0-8ubuntu3) 
  root@pclaidev:/rhel-home/pclai/test/ubuntu17.10/stdint#

** Affects: xen (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1725390

Title:
  bits/libc-header-start.h: No such file

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1725390/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954465] [NEW] KVM AIA User IPI

2021-12-10 Thread Paul Lai
Public bug reported:

SENDUIPI is a new ring-3 instruction that sending IPI notification
between ring 3 software. It uses a data structure (table) owned and
managed by ring 0 OS. Ring 3 software can choose which table entry to
invoke.

Target Linux 5.18

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954465

Title:
  KVM AIA User IPI

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954465/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954464] [NEW] kvm SPR support for AMX

2021-12-10 Thread Paul Lai
Public bug reported:

AMX (including XFD):  AMX (Advance Matrix eXtensions) is a new programming 
paradigm for direct matrix operations. TMUL (TILE Matrix mULtiply unit) is the 
multiply accelerator. XFD (Extended Feature Disable) is an XSAVE extension 
mechanism for those features with large XSAVE storage context, that enables the 
OS not pre-allocate the space initially. AMX is the first one using XFD feature.
Use cases: Deep learning inference and training (CNN, DNN), other data 
analytics and machine learning apps, HPC SGEMM

Target Linux 5.17

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954464

Title:
  kvm SPR support for AMX

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954464/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954463] [NEW] KVM ROP Control-Flow Enforcement Tech (CET)

2021-12-10 Thread Paul Lai
Public bug reported:

Control-Flow Enforcement Tech (CET)

What is Intel CET:
Control-flow Enforcement Technology (CET) provides protection against
return/jump-oriented programming (ROP) attacks. It can be implemented
to protect both the kernel and applications. In the first phase,
only the user-mode protection is implemented on the 64-bit kernel.
However, 32-bit applications are supported under the compatibility
mode.
CET includes shadow stack (SHSTK) and indirect branch tracking (IBT).
The SHSTK is a secondary stack allocated from memory. The processor
automatically pushes/pops a secure copy to the SHSTK every return
address and, by comparing the secure copy to the program stack copy,
verifies function returns are as intended. The IBT verifies all
indirect CALL/JMP targets are intended and marked by the compiler with
'ENDBR' op codes.

Why need this technology(CET VMX):
CET also can provide ROP attack in guest OS with VMX HW support. This will 
enhance platform security in Cloud computing, it's meaningful for Cloud service 
providers.

Key change in kvm:
To enable KVM based CET feature for guest OS, we need to :
1) Expose the features(CET SHSTK/IBT) to guest OS via CPUID report.
2) Enable xsaves/xrstors support for guest OS.
3) Fix xsaves/xrstors issue in existing KVM code.
4) Enabled CET states loading in guest entry/exit.
5) Add CET VMX related definitions.

Key change in Qemu-kvm:
expose CET related CPUID and xsaves/xrstors support to guest.

Target Linux 5.18

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

** Package changed: xen (Ubuntu) => kvm (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954463

Title:
  KVM ROP Control-Flow Enforcement Tech (CET)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954463/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954468] [NEW] KVM Architectural LBRs

2021-12-10 Thread Paul Lai
Public bug reported:

Architectural LBRs (Last Branch Records)

Architectural LBRs (Last Branch Records) enable recording of software
path history by logging taken branches and other control flow transfers
within model-specific registers, and is inherited from legacy LBR. If
CPUID.(EAX=07H, ECX=0):EDX[19] is set to 1, the processor supports
Architectural LBRs. With VMCS support and XSAVE support, the KVM guests
could also use ARCH LBR as well.

Target Linux 5.17

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954468

Title:
  KVM Architectural LBRs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954468/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954466] [NEW] KVM Protection Keys for Supervisor Pages (PKS)

2021-12-10 Thread Paul Lai
Public bug reported:

SKX introduced the Protection Key for User Pages (PKU) feature enabling
fast, thread-specific manipulation of permission restrictions on user
pages. SPR introduced Protection Key for Supervisor Pages(PKS), a new
feature that extends the Protection Key architecture to support thread-
specific permission restrictions on supervisor pages. This important
feature enables enhanced access control on memory, and brings more valid
usage model.

Generally PKS enables protections on 'domains' of supervisor pages to
limit supervisor mode access to pages beyond the normal paging
protections(U/S, R/W, P). PKS works in a similar fashion to user space
pkeys, PKU. As with PKU, supervisor pkeys are checked in addition to
normal paging protections and Access or Writes can be disabled via a MSR
update without TLB flushes when permissions change.

PKS virtualization enabling should base on existing PKU code. Major
works:

CPUID exposure

New CR4 bit exposure

New VMCS fields enabling

IA32_PKRS saving/restoring

#GP handling


Target Linux 5.19

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954466

Title:
  KVM Protection Keys for Supervisor Pages (PKS)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954466/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954469] [NEW] KVM Bus Lock Debug Exception

2021-12-10 Thread Paul Lai
Public bug reported:

A bus lock is acquired either through split locked access to writeback (WB) 
memory or by using locks to uncacheable (UC) memory. This is typically > 1000 
cycles slower than atomic operation within a cache
line. It also disrupts performance on other cores (which must wait for the bus 
lock to be released before their memory operations).

Bus lock debug exception is a sub-feature of bus lock detection. It is
an ability to notify the kernel by an #DB trap after the instruction
acquires a bus lock when CPL>0. This allows the kernel to enforce user
application throttling or mitigations.

A logical processor can be configured to generate a debug exception
(#DB) following acquisition of a bus lock.

Software enables those debug exceptions by setting bit 2 of the
IA32_DEBUGCTL MSR. The CPU enumerates this feature using CPUID.(EAX=7,
ECX=0).ECX[24].

A debug exception due to acquistion of a bus lock is reported as a trap
following execution of the instruction acquiring the bus lock. The
processor identifies such debug exceptions using bit 11 of DR6: delivery
of a bus-lock #DB clears DR6[11].

Linux 5.13

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954469

Title:
  KVM Bus Lock Debug Exception

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954469/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954471] [NEW] KVM AIA Work Dispatch Instructions

2021-12-10 Thread Paul Lai
Public bug reported:

AIA has 3 sub features:

AIA User Interrupts
AIA User Wait Instructions
AIA Work Dispatch Instructions

AIA User Wait Instructions was merged for SNR in Kernel 5.4/Qemu4.2.

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954471

Title:
  KVM AIA Work Dispatch Instructions

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954472] [NEW] KVM Scalable I/O Virtualization

2021-12-10 Thread Paul Lai
Public bug reported:

Core OS/ VMM device virtualization framework extended to support
Scalable IOV; OS/ VMM support for Scalable IOV IOMMU extensions; PASID
translation support; existing device frameworks extended to support
Scalable IOV; converged SW arch as prescribed by spec

Improved performance and lower complexity for software utilizing PCIe
devices in virtualized environments

Software Benefits: Broad range of usages, e.g. security, comms, server
graphics

Target Linux 5.18

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954472

Title:
  KVM Scalable I/O Virtualization

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954472/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954473] [NEW] KVM Shared Virtual Memory (SVM)

2021-12-10 Thread Paul Lai
Public bug reported:

SVM is short for shared virtual memory. This task is aiming at enabling
SVM support for assigned devices on KVM. Example: assign a GPU from host
to guest, the application program running in guest could share its
virtual memory address to the assigned device.

Latest update: extend the vIOMMU in QEMU to support SVM feature.

1. Description of the Technology.
SVM is shorted for Shared Virtual Memory, it is a VT-d feature that allows 
sharing application virtual address space with the I/O device. The feature 
works with the PCI sig Process Address Space ID (PASID). SVM has the following 
benefits:
• Programmer gets a consistent view of memory across host application and device
• Efficient access to data, avoiding pining or copying overheads
2. Use cases that is important for this technology (aka, why is this technology 
needed).
Intel has multiple IPs that would support SVM, and the usage in guest is also a 
demand. e.g. QAT, it is usual to assign a QAT to guest and requires SVM to 
benefit from its advantages.
3. General design description (components modified: kvm, qemu-kvm, driver, 
libvirt (and other userland libraries))
Modified components would include: qemu-kvm, vfio driver, iommu driver

Target Linux 5.19

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954473

Title:
  KVM Shared Virtual Memory (SVM)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954473/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954474] [NEW] KVM notify VM Exit

2021-12-10 Thread Paul Lai
Public bug reported:

A VMM can enable notification VM exits to occur if no interrupt windows
occur in VMX non-root operation for a specified amount of time (notify
window).


KVM Enabling:

enable bit 31 of secondary processor-based excution control.
enable notification VM exit (exit reason 75) handler.
expose a module param to configure notify window and disable/enable VM notify.

Target Linux 5.17

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954474

Title:
  KVM notify VM Exit

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1954474/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954466] Re: KVM Protection Keys for Supervisor Pages (PKS)

2021-12-13 Thread Paul Lai
Thanks for correcting pkg names.

No upstream commits yet. Target Linux 5.19 timeframe. Target Ubuntu
23.04.

Platform is Sapphire Rapids

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954466

Title:
  KVM Protection Keys for Supervisor Pages (PKS)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954466/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954463] Re: KVM ROP Control-Flow Enforcement Tech (CET)

2021-12-13 Thread Paul Lai
Thanks for correcting pkg names.

No upstream commits yet.  Target Linux 5.18 timeframe.  Target Ubuntu
22.10.

Platform is Sapphire Rapids.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954463

Title:
  KVM ROP Control-Flow Enforcement Tech (CET)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954463/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954465] Re: KVM AIA User IPI

2021-12-13 Thread Paul Lai
Thanks for correcting pkg names.

No upstream commits yet. Target Linux 5.18 timeframe. Target Ubuntu
22.10.

Platform is Sapphire Rapids.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954465

Title:
  KVM AIA User IPI

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954465/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954464] Re: kvm SPR support for AMX

2021-12-13 Thread Paul Lai
Thanks for correcting pkg names.

No upstream commits yet.  Target Linux 5.18 timeframe.  Target Ubuntu 22.04.
Platform is Sapphire Rapids.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954464

Title:
  kvm SPR support for AMX

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954464/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954473] Re: KVM Shared Virtual Memory (SVM)

2021-12-13 Thread Paul Lai
Thanks for correcting pkg names.

No upstream commits yet. Target Linux 5.19 timeframe. Target Ubuntu
23.04.

Platform is Sapphire Rapids

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954473

Title:
  KVM Shared Virtual Memory (SVM)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954473/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954474] Re: KVM notify VM Exit

2021-12-13 Thread Paul Lai
Thanks for correcting pkg names.

No upstream commits yet. Target Linux 5.17 timeframe. Target Ubuntu
22.04.

Platform is Sapphire Rapids

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954474

Title:
  KVM notify VM Exit

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954474/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954472] Re: KVM Scalable I/O Virtualization

2021-12-13 Thread Paul Lai
Thanks for correcting pkg names.

No upstream commits yet. Target Linux 5.18 timeframe. Target Ubuntu
22.10.

Platform is Sapphire Rapids

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954472

Title:
  KVM Scalable I/O Virtualization

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954472/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954471] Re: KVM AIA Work Dispatch Instructions

2021-12-13 Thread Paul Lai
Thanks for correcting pkg names.

No upstream commits yet. Target Linux TBD.

Platform is Sapphire Rapids

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954471

Title:
  KVM AIA Work Dispatch Instructions

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1954469] Re: KVM Bus Lock Debug Exception

2021-12-13 Thread Paul Lai
in linux 5.13
e8ea85fb2 KVM: X86: Add support for the emulation of DR6_BUS_LOCK bit
76ea438b4 KVM: X86: Expose bus lock debug exception to guest

qemu 6.1
06e878b41 target/i386: Add bus lock debug exception support

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954469

Title:
  KVM Bus Lock Debug Exception

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1954469/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1956998] [NEW] kvm SGX numa support

2022-01-10 Thread Paul Lai
Public bug reported:

The basic SGX patches were merged into Qemu release, the left NUMA
function for SGX should be enabled. The patch1 implemented the SGX NUMA
ACPI to enable NUMA in the SGX guest. Since Libvirt need detailed host
SGX EPC sections info to decide how to allocate EPC sections for SGX NUMA
guest, the SGXEPCSection list is introduced to show detailed sections info
in the monitor or HMP interface.

Please help review this patchset, the link also can be found:
https://github.com/intel/qemu-sgx upstream

Platform: Ice Lake

qemu 6.2

110581238 numa: Enable numa for SGX EPC sections
4755927ae numa: Support SGX numa in the monitor and Libvirt interfaces
d1889b360 doc: Add the SGX numa description

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1956998

Title:
  kvm SGX numa support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1956998/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1967894] [NEW] KVM IPI Virtualization support for SPR

2022-04-05 Thread Paul Lai
Public bug reported:

IPI virtualization targets to make the processor emulate the write to APIC 
registers that would send IPIs in virtualized system. 
VMX provide new VM-execution control and VMCS field to support IPI 
virtualization which can eliminate APIC-Write VM-exit.
The processor sets the bit corresponding to the vector in target vCPU's PIR and 
may send a notification (IPI) specified by NDST 
and NV fields in target vCPU's PID. It is similar to what IOMMU engine does 
when dealing with posted interrupt from devices.

IPI Virtualization is approved in SPR/EGS CCB and  it is supposed to be
enabled in C-step or later (perhaps D-step).


Subject: Re: [PATCH v7 8/8] KVM: VMX: enable IPI virtualization
https://lore.kernel.org/kvm/54df6da8-ad68-cc75-48db-d18fc8743...@intel.com/

Target Linux 5.18

** Affects: kvm (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1967894

Title:
  KVM IPI Virtualization support for SPR

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/1967894/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs