lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 25 Mar 2024 08:02:27 +0000
From: "Ma, XiangfeiX" <xiangfeix.ma@...el.com>
To: "Zhao, Yan Y" <yan.y.zhao@...el.com>, Sean Christopherson
	<seanjc@...gle.com>, "Hao, Xudong" <xudong.hao@...el.com>
CC: Paolo Bonzini <pbonzini@...hat.com>, Lai Jiangshan
	<jiangshanlai@...il.com>, "Paul E. McKenney" <paulmck@...nel.org>, "Josh
 Triplett" <josh@...htriplett.org>, "kvm@...r.kernel.org"
	<kvm@...r.kernel.org>, "rcu@...r.kernel.org" <rcu@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "Tian, Kevin"
	<kevin.tian@...el.com>, Yiwei Zhang <zzyiwei@...gle.com>
Subject: RE: [PATCH 0/5] KVM: VMX: Drop MTRR virtualization, honor guest PAT


Tested-by: Xiangfei Ma <xiangfeix.ma@...el.com>

Testing environment is based on the EMR-2S3 platform + CentOS 9(kernel version: 6.8.0-rc4).
Test cases include cpu, amx, umip, ptvmx, IPIv, vtd, PMU, SGX, kmv-unit-tests, kvm selftests, etc. And workload test on the guest using Netperf(bridge) and SPECJBB(passthrough NIC).
Except for the known issue and the previously mentioned "rdtsc_vmexit_diff_test", no other issue found.

-----Original Message-----
From: Ma, XiangfeiX 
Sent: Monday, March 25, 2024 2:56 PM
To: Zhao, Yan Y <yan.y.zhao@...el.com>; Sean Christopherson <seanjc@...gle.com>; Hao, Xudong <xudong.hao@...el.com>
Cc: Paolo Bonzini <pbonzini@...hat.com>; Lai Jiangshan <jiangshanlai@...il.com>; Paul E. McKenney <paulmck@...nel.org>; Josh Triplett <josh@...htriplett.org>; kvm@...r.kernel.org; rcu@...r.kernel.org; linux-kernel@...r.kernelorg; Tian, Kevin <kevin.tian@...el.com>; Yiwei Zhang <zzyiwei@...gle.com>
Subject: RE: [PATCH 0/5] KVM: VMX: Drop MTRR virtualization, honor guest PAT

Tested-by: Xiangfei Ma <xiangfeix.ma@...el.com>

I have verified this method which can solve the issue.

-----Original Message-----
From: Zhao, Yan Y <yan.y.zhao@...el.com> 
Sent: Friday, March 22, 2024 9:08 PM
To: Sean Christopherson <seanjc@...gle.com>; Ma, XiangfeiX <xiangfeix.ma@...el.com>; Hao, Xudong <xudong.hao@...el.com>
Cc: Paolo Bonzini <pbonzini@...hat.com>; Lai Jiangshan <jiangshanlai@...il.com>; Paul E. McKenney <paulmck@...nel.org>; Josh Triplett <josh@...htriplett.org>; kvm@...r.kernel.org; rcu@...r.kernel.org; linux-kernel@...r.kernelorg; Tian, Kevin <kevin.tian@...el.com>; Yiwei Zhang <zzyiwei@...gle.com>
Subject: Re: [PATCH 0/5] KVM: VMX: Drop MTRR virtualization, honor guest PAT

Xiangfei found out an failure in kvm unit test rdtsc_vmexit_diff_test with below error log:
"FAIL: RDTSC to VM-exit delta too high in 100 of 100 iterations, last = 902
FAIL: Guest didn't run to completion."

Fixed it by adding below lines in the unit test rdtsc_vmexit_diff_test before enter guest in my side.
vmcs_write(HOST_PAT, 0x6);
vmcs_clear_bits(EXI_CONTROLS, EXI_SAVE_PAT); vmcs_set_bits(EXI_CONTROLS, EXI_LOAD_PAT);


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ