Hi Joseph,

> I built a test kernel with the requested commit.
> The test kernel can be downloaded from:
> http://kernel.ubuntu.com/~jsalisbury/lp1792957
> 
> Can you test this kernel and see if it resolves this bug?

I tested this kernel in the following scenarios:

 - Booted the host on a P9 machine and started an 18.04 guest using the default 
parameters.
 - Removed the kvm_hv module and reinstalled it using the 'one_vm_per_core' 
parameter, shut down the 18.04 guest and restarted it.

➜  ~ sudo virsh destroy breno-1804
➜  ~ sudo rmmod kvm_hv
➜  ~ sudo modprobe kvm_hv one_vm_per_core=1
➜  ~ sudo virsh start --console breno-1804

On both guests I ran sysbench, as:

breno@ubuntu:~$ sysbench  --threads=16 cpu run
sysbench 1.0.11 (using system LuaJIT 2.1.0-beta3)

Running the test with following options:

breno@ubuntu:~$ sysbench  --threads=16 cpu run
   Number of threads: 16
   Initializing random number generator from current time
   Prime numbers limit: 10000
   Initializing worker threads...
   Threads started!

   CPU speed:
       events per second: 33648.49
   ..... 

Everything worked fine. I think this patch is good to get accepted.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1792957

Title:
  Provide mode where all vCPUs on a core must be the same VM

Status in The Ubuntu-power-systems project:
  In Progress
Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Bionic:
  In Progress

Bug description:
  == Comment: #0 - Leonardo Augusto Guimaraes Garcia <lagar...@br.ibm.com> - 
2018-09-13 07:12:48 ==
  +++ This bug was initially created as a clone of Bug #171443 +++

  Please, add the following patch:

  http://patchwork.ozlabs.org/patch/968786/

  which adds a mode where all vCPUs on a core must be the same VM on
  POWER8 and POWER9.

  This is intended for use in security-conscious settings where users
  are concerned about possible side-channel attacks between threads
  which could perhaps enable one VM to attack another VM on the same
  core, or the host.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1792957/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to