From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.7 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 00683C433E7 for ; Sat, 17 Oct 2020 11:51:38 +0000 (UTC) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 028AD20704 for ; Sat, 17 Oct 2020 11:51:36 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 028AD20704 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=bugs.launchpad.net Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Received: from localhost ([::1]:45002 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kTkkJ-0008VO-Sj for qemu-devel@archiver.kernel.org; Sat, 17 Oct 2020 07:51:35 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:44768) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kTkjV-0007k0-O7 for qemu-devel@nongnu.org; Sat, 17 Oct 2020 07:50:45 -0400 Received: from indium.canonical.com ([91.189.90.7]:60696) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1kTkjT-0005rp-3u for qemu-devel@nongnu.org; Sat, 17 Oct 2020 07:50:45 -0400 Received: from loganberry.canonical.com ([91.189.90.37]) by indium.canonical.com with esmtp (Exim 4.86_2 #2 (Debian)) id 1kTkjR-0004qX-2D for ; Sat, 17 Oct 2020 11:50:41 +0000 Received: from loganberry.canonical.com (localhost [127.0.0.1]) by loganberry.canonical.com (Postfix) with ESMTP id 0E2A32E811E for ; Sat, 17 Oct 2020 11:50:41 +0000 (UTC) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Date: Sat, 17 Oct 2020 11:35:42 -0000 From: Satheesh Rajendran <1900241@bugs.launchpad.net> To: qemu-devel@nongnu.org X-Launchpad-Notification-Type: bug X-Launchpad-Bug: product=qemu; status=New; importance=Undecided; assignee=None; X-Launchpad-Bug-Tags: kvm powerpc xive X-Launchpad-Bug-Information-Type: Public X-Launchpad-Bug-Private: no X-Launchpad-Bug-Security-Vulnerability: no X-Launchpad-Bug-Commenters: sathnaga X-Launchpad-Bug-Reporter: Satheesh Rajendran (sathnaga) X-Launchpad-Bug-Modifier: Satheesh Rajendran (sathnaga) Message-Id: <160293454254.8431.993577940537988142.malonedeb@chaenomeles.canonical.com> Subject: [Bug 1900241] [NEW] [regression][powerpc] some vcpus are found offline inside guest with different vsmt setting from qemu-cmdline and breaks subsequent vcpu hotplug operation (xive) X-Launchpad-Message-Rationale: Subscriber (QEMU) @qemu-devel-ml X-Launchpad-Message-For: qemu-devel-ml Precedence: bulk X-Generated-By: Launchpad (canonical.com); Revision="58bb2f3096f16f0e0acc917602669aecb4ffaf54"; Instance="production" X-Launchpad-Hash: 56bda494c428e321e5a2cef1a71d0b371c88274c Received-SPF: none client-ip=91.189.90.7; envelope-from=bounces@canonical.com; helo=indium.canonical.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/10/17 07:50:41 X-ACL-Warn: Detected OS = Linux 3.11 and newer [fuzzy] X-Spam_score_int: -65 X-Spam_score: -6.6 X-Spam_bar: ------ X-Spam_report: (-6.6 / 5.0 requ) BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.25, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: Bug 1900241 <1900241@bugs.launchpad.net> Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: "Qemu-devel" Public bug reported: Env: Host: Power9 HW ppc64le # lscpu Architecture: ppc64le Byte Order: Little Endian CPU(s): 128 On-line CPU(s) list: 24-31,40-159 Thread(s) per core: 4 Core(s) per socket: 16 Socket(s): 2 NUMA node(s): 2 Model: 2.3 (pvr 004e 1203) Model name: POWER9, altivec supported Frequency boost: enabled CPU max MHz: 3800.0000 CPU min MHz: 2300.0000 L1d cache: 1 MiB L1i cache: 1 MiB L2 cache: 8 MiB L3 cache: 160 MiB NUMA node0 CPU(s): 24-31,40-79 NUMA node8 CPU(s): 80-159 Vulnerability Itlb multihit: Not affected Vulnerability L1tf: Mitigation; RFI Flush, L1D private per thr= ead Vulnerability Mds: Not affected Vulnerability Meltdown: Mitigation; RFI Flush, L1D private per thr= ead Vulnerability Spec store bypass: Mitigation; Kernel entry/exit barrier (eie= io) Vulnerability Spectre v1: Mitigation; __user pointer sanitization, o= ri31 speculation barrier enabled Vulnerability Spectre v2: Mitigation; Software count cache flush (ha= rdware accelerated), Software link stack flush Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected Host Kernel: 5.9.0-0.rc8.28.fc34.ppc64le (Fedora rawhide) Guest Kernel: Fedora33(5.8.6-301.fc33.ppc64le) Qemu: e12ce85b2c79d83a340953291912875c30b3af06 (qemu/master) Steps to reproduce: Boot below kvm guest: (-M pseries,vsmt=3D2 -smp 8,cores=3D8,threads=3D1) /home/sath/qemu/build/qemu-system-ppc64 -name vm1 -M pseries,vsmt=3D2 -accel kvm -m 4096 -smp 8,cores=3D8,threads=3D1 -nographic -nodefaults -serial mon:stdio -vga none -nographic -device virtio-scsi-pci -drive file=3D/home/sath/tests/data/avocado-vt/images/fdevel- ppc64le.qcow2,if=3Dnone,id=3Dhd0,format=3Dqcow2,cache=3Dnone -device scsi- hd,drive=3Dhd0 lscpu inside guest: Actual: [root@atest-guest ~]# lscpu Architecture: ppc64le Byte Order: Little Endian CPU(s): 8 On-line CPU(s) list: 0,2,4,6 Off-line CPU(s) list: 1,3,5,7 --------------------------NOK Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 NUMA node(s): 1 Model: 2.3 (pvr 004e 1203) Model name: POWER9 (architected), altivec supported Hypervisor vendor: KVM Virtualization type: para L1d cache: 128 KiB L1i cache: 128 KiB NUMA node0 CPU(s): 0,2,4,6 Vulnerability Itlb multihit: Not affected Vulnerability L1tf: Mitigation; RFI Flush, L1D private per thr= ead Vulnerability Mds: Not affected Vulnerability Meltdown: Mitigation; RFI Flush, L1D private per thr= ead Vulnerability Spec store bypass: Mitigation; Kernel entry/exit barrier (eie= io) Vulnerability Spectre v1: Mitigation; __user pointer sanitization, o= ri31 = speculation barrier enabled Vulnerability Spectre v2: Mitigation; Software count cache flush (ha= rdwar e accelerated), Software link stack flush Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected Expected: [root@atest-guest ~]# lscpu Architecture: ppc64le Byte Order: Little Endian CPU(s): 8 On-line CPU(s) list: 0-7 Thread(s) per core: 1 Core(s) per socket: 8 Socket(s): 1 NUMA node(s): 1 Model: 2.3 (pvr 004e 1203) Model name: POWER9 (architected), altivec supported Hypervisor vendor: KVM Virtualization type: para L1d cache: 256 KiB L1i cache: 256 KiB NUMA node0 CPU(s): 0-7 Vulnerability Itlb multihit: Not affected Vulnerability L1tf: Mitigation; RFI Flush, L1D private per thr= ead Vulnerability Mds: Not affected Vulnerability Meltdown: Mitigation; RFI Flush, L1D private per thr= ead Vulnerability Spec store bypass: Mitigation; Kernel entry/exit barrier (eie= io) Vulnerability Spectre v1: Mitigation; __user pointer sanitization, o= ri31 = speculation barrier enabled Vulnerability Spectre v2: Mitigation; Software count cache flush (ha= rdwar e accelerated), Software link stack flush Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected There by further vcpuhotplug operation fails... ** Affects: qemu Importance: Undecided Status: New ** Tags: kvm powerpc xive ** Tags added: kvm powerpc xive -- = You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. https://bugs.launchpad.net/bugs/1900241 Title: [regression][powerpc] some vcpus are found offline inside guest with different vsmt setting from qemu-cmdline and breaks subsequent vcpu hotplug operation (xive) Status in QEMU: New Bug description: Env: Host: Power9 HW ppc64le # lscpu Architecture: ppc64le Byte Order: Little Endian CPU(s): 128 On-line CPU(s) list: 24-31,40-159 Thread(s) per core: 4 Core(s) per socket: 16 Socket(s): 2 NUMA node(s): 2 Model: 2.3 (pvr 004e 1203) Model name: POWER9, altivec supported Frequency boost: enabled CPU max MHz: 3800.0000 CPU min MHz: 2300.0000 L1d cache: 1 MiB L1i cache: 1 MiB L2 cache: 8 MiB L3 cache: 160 MiB NUMA node0 CPU(s): 24-31,40-79 NUMA node8 CPU(s): 80-159 Vulnerability Itlb multihit: Not affected Vulnerability L1tf: Mitigation; RFI Flush, L1D private per t= hread Vulnerability Mds: Not affected Vulnerability Meltdown: Mitigation; RFI Flush, L1D private per t= hread Vulnerability Spec store bypass: Mitigation; Kernel entry/exit barrier (e= ieio) Vulnerability Spectre v1: Mitigation; __user pointer sanitization,= ori31 speculation barrier enabled Vulnerability Spectre v2: Mitigation; Software count cache flush (= hardware accelerated), Software link stack flush Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected Host Kernel: 5.9.0-0.rc8.28.fc34.ppc64le (Fedora rawhide) Guest Kernel: Fedora33(5.8.6-301.fc33.ppc64le) Qemu: e12ce85b2c79d83a340953291912875c30b3af06 (qemu/master) = Steps to reproduce: Boot below kvm guest: (-M pseries,vsmt=3D2 -smp 8,cores=3D8,threads=3D1) /home/sath/qemu/build/qemu-system-ppc64 -name vm1 -M pseries,vsmt=3D2 -accel kvm -m 4096 -smp 8,cores=3D8,threads=3D1 -nographic -nodefaults -serial mon:stdio -vga none -nographic -device virtio-scsi-pci -drive file=3D/home/sath/tests/data/avocado-vt/images/fdevel- ppc64le.qcow2,if=3Dnone,id=3Dhd0,format=3Dqcow2,cache=3Dnone -device scsi- hd,drive=3Dhd0 = lscpu inside guest: Actual: [root@atest-guest ~]# lscpu Architecture: ppc64le Byte Order: Little Endian CPU(s): 8 On-line CPU(s) list: 0,2,4,6 Off-line CPU(s) list: 1,3,5,7 --------------------------NOK Thread(s) per core: 1 Core(s) per socket: 4 Socket(s): 1 NUMA node(s): 1 Model: 2.3 (pvr 004e 1203) Model name: POWER9 (architected), altivec supported Hypervisor vendor: KVM Virtualization type: para L1d cache: 128 KiB L1i cache: 128 KiB NUMA node0 CPU(s): 0,2,4,6 Vulnerability Itlb multihit: Not affected Vulnerability L1tf: Mitigation; RFI Flush, L1D private per t= hread Vulnerability Mds: Not affected Vulnerability Meltdown: Mitigation; RFI Flush, L1D private per t= hread Vulnerability Spec store bypass: Mitigation; Kernel entry/exit barrier (e= ieio) Vulnerability Spectre v1: Mitigation; __user pointer sanitization,= ori31 = speculation barrier enabled Vulnerability Spectre v2: Mitigation; Software count cache flush (= hardwar e accelerated), Software link stack flush Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected = Expected: [root@atest-guest ~]# lscpu Architecture: ppc64le Byte Order: Little Endian CPU(s): 8 On-line CPU(s) list: 0-7 Thread(s) per core: 1 Core(s) per socket: 8 Socket(s): 1 NUMA node(s): 1 Model: 2.3 (pvr 004e 1203) Model name: POWER9 (architected), altivec supported Hypervisor vendor: KVM Virtualization type: para L1d cache: 256 KiB L1i cache: 256 KiB NUMA node0 CPU(s): 0-7 Vulnerability Itlb multihit: Not affected Vulnerability L1tf: Mitigation; RFI Flush, L1D private per t= hread Vulnerability Mds: Not affected Vulnerability Meltdown: Mitigation; RFI Flush, L1D private per t= hread Vulnerability Spec store bypass: Mitigation; Kernel entry/exit barrier (e= ieio) Vulnerability Spectre v1: Mitigation; __user pointer sanitization,= ori31 = speculation barrier enabled Vulnerability Spectre v2: Mitigation; Software count cache flush (= hardwar e accelerated), Software link stack flush Vulnerability Srbds: Not affected Vulnerability Tsx async abort: Not affected There by further vcpuhotplug operation fails... To manage notifications about this bug go to: https://bugs.launchpad.net/qemu/+bug/1900241/+subscriptions