Bug 1725084
| Summary: | aarch64: support dumping SVE registers | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux Advanced Virtualization | Reporter: | Andrew Jones <drjones> | ||||
| Component: | qemu-kvm | Assignee: | Andrew Jones <drjones> | ||||
| qemu-kvm sub component: | CPU Models | QA Contact: | Qunfang Zhang <qzhang> | ||||
| Status: | CLOSED ERRATA | Docs Contact: | |||||
| Severity: | unspecified | ||||||
| Priority: | unspecified | CC: | juzhang, lcapitulino, mtessun, qzhang, virt-maint | ||||
| Version: | 8.1 | Keywords: | FutureFeature, OtherQA | ||||
| Target Milestone: | rc | Flags: | knoel:
mirror+
|
||||
| Target Release: | 8.1 | ||||||
| Hardware: | aarch64 | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | qemu-kvm-4.2.0-8.module+el8.2.0+5607+dc756904 | Doc Type: | Enhancement | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2020-05-05 09:46:33 UTC | Type: | Feature Request | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 1707892 | ||||||
| Bug Blocks: | 1677408, 1707874 | ||||||
| Attachments: |
|
||||||
|
Description
Andrew Jones
2019-06-28 11:33:28 UTC
I posted[*] this a while back, and it's been reviewed. Just waiting on more review and merge now. [*] https://patchwork.kernel.org/patch/11193797/ This is now upstream: 538baab245ca ("target/arm/arch_dump: Add SVE notes")
QEMU has been recently split into sub-components and as a one-time operation to avoid breakage of tools, we are setting the QEMU sub-component of this BZ to "General". Please review and change the sub-component if necessary the next time you review this BZ. Thanks Created attachment 1668177 [details]
program to load sve vectors
This bug may be moved to VERIFIED.
Version tested: qemu-kvm-4.2.0-12.module+el8.2.0+5858+afd073bc.aarch64
Verification steps
------------------
1) Get host notes
(On a host that supports at least 64 byte SVE vectors)
# ulimit -c unlimited
# echo kcore > /proc/sys/kernel/core_pattern
# ./v 64 &
# kill -s SIGSEGV <pid-of-v>
# readelf -n kcore.<pid-of-v>
(repeat above for './v 32' and './v 0')
2) Get guest notes
a) boot guest with sve enabled and with the same vector lengths as the host
b) on guest run ./v 64
c) on host run 'virsh dump --memory-only $GUEST guest-dump-64'
d) on guest stop ./v with ^C
e) on host 'readelf -n guest-dump-64'
(repeat above for './v 32' and './v 0')
3) Collect the note description data of the 0x405 (Unknown note type: (0x00000405)) ELF notes for all the runs
4) Compare the data for the same run types, e.g. 'diff kcore-64.405-data guest-dump-64.405-data'
All comparisons should match, i.e. the ELF note generated by QEMU for SVE vectors should match the ELF note generated by the kernel for the same vector use.
With qemu-kvm-4.2.0-12.module+el8.2.0+5858+afd073bc.aarch64 this test PASSed.
Thanks Drew! Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:2017 |