From: bugzilla-daemon@kernel.org
To: kvm@vger.kernel.org
Subject: [Bug 217574] kvm_intel loads only after suspend
Date: Fri, 23 Jun 2023 16:22:47 +0000 [thread overview]
Message-ID: <bug-217574-28872-erfsaQcRqO@https.bugzilla.kernel.org/> (raw)
In-Reply-To: <bug-217574-28872@https.bugzilla.kernel.org/>
https://bugzilla.kernel.org/show_bug.cgi?id=217574
--- Comment #3 from drigohighlander (drigoslkx@gmail.com) ---
Hi, here is the output after bootup:
bash-5.2# rdmsr -a 0x480
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
after suspension:
bash-5.2# rdmsr -a 0x480
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
da040000000012
bash-5.2#
lscpu:
bash-5.2# lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Address sizes: 46 bits physical, 48 bits virtual
Byte Order: Little Endian
CPU(s): 36
On-line CPU(s) list: 0-35
Vendor ID: GenuineIntel
BIOS Vendor ID: Intel
Model name: Intel(R) Xeon(R) CPU E5-2696 v3 @ 2.30GHz
BIOS Model name: Intel(R) Xeon(R) CPU E5-2696 v3 @ 2.30GHz CPU @
2.3GHz
BIOS CPU family: 179
CPU family: 6
Model: 63
Thread(s) per core: 2
Core(s) per socket: 18
Socket(s): 1
Stepping: 2
CPU(s) scaling MHz: 64%
CPU max MHz: 3800.0000
CPU min MHz: 1200.0000
BogoMIPS: 4589.05
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge
mc
a cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss
ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc
arc
h_perfmon pebs bts rep_good nopl xtopology nonstop_tsc
cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl
vm
x smx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid dca
ss
e4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c
rdra
nd lahf_lm abm cpuid_fault epb invpcid_single pti
intel
_ppin tpr_shadow vnmi flexpriority ept vpid ept_ad
fsgs
base tsc_adjust bmi1 hle avx2 smep bmi2 erms invpcid
rt
m cqm xsaveopt cqm_llc cqm_occup_llc dtherm ida arat
pl
n pts
Virtualization features:
Virtualization: VT-x
Caches (sum of all):
L1d: 576 KiB (18 instances)
L1i: 576 KiB (18 instances)
L2: 4.5 MiB (18 instances)
L3: 45 MiB (1 instance)
NUMA:
NUMA node(s): 1
NUMA node0 CPU(s): 0-35
Vulnerabilities:
Itlb multihit: KVM: Mitigation: VMX disabled
L1tf: Mitigation; PTE Inversion; VMX conditional cache
flushe
s, SMT vulnerable
Mds: Vulnerable: Clear CPU buffers attempted, no microcode;
SMT vulnerable
Meltdown: Mitigation; PTI
Mmio stale data: Vulnerable: Clear CPU buffers attempted, no microcode;
SMT vulnerable
Retbleed: Not affected
Spec store bypass: Vulnerable
Spectre v1: Mitigation; usercopy/swapgs barriers and __user
pointer
sanitization
Spectre v2: Mitigation; Retpolines, STIBP disabled, RSB filling,
PB
RSB-eIBRS Not affected
Srbds: Not affected
Tsx async abort: Not affected
bash-5.2#
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are watching the assignee of the bug.
next prev parent reply other threads:[~2023-06-23 16:22 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-06-19 16:38 [Bug 217574] New: kvm_intel loads only after suspend bugzilla-daemon
2023-06-20 8:49 ` [Bug 217574] " bugzilla-daemon
2023-06-22 20:42 ` bugzilla-daemon
2023-06-23 16:22 ` bugzilla-daemon [this message]
2023-06-23 20:08 ` bugzilla-daemon
2023-06-24 18:58 ` bugzilla-daemon
2023-06-26 2:56 ` bugzilla-daemon
2023-06-28 13:26 ` bugzilla-daemon
2023-06-28 13:53 ` bugzilla-daemon
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=bug-217574-28872-erfsaQcRqO@https.bugzilla.kernel.org/ \
--to=bugzilla-daemon@kernel.org \
--cc=kvm@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).