** Description changed:
When bit 29 is set in Test Control MSR register 0x33, a #AC execption
is generated for split locked accesses at all CPL irrespective of
CR0.AM or EFLAGS.AC.
This feature can help developers to capture memory accesses that across
cachelines with #LOCK assertio
** Changed in: linux (Ubuntu)
Importance: Undecided => Wishlist
** Changed in: qemu (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1782209
Title:
KVM
Related QEMU patch can be found at:
https://lists.gnu.org/archive/html/qemu-devel/2019-03/msg00507.html
and related kvm-unit-test can be found at:
https://patchwork.kernel.org/patch/10837677/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Hi,
I have not seen the kernel changes in 5.2 RCs - is there an update on their
progress?
Also any updates, links, commits on the related qemu contribution?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bu
** Description changed:
When bit 29 is set in Test Control MSR register 0x33, a #AC execption
is generated for split locked accesses at all CPL irrespective of
CR0.AM or EFLAGS.AC.
This feature can help developers to capture memory accesses that across
cachelines with #LOCK assertio
My questions in comment #1 where no answered directly yet, but this
still is using only kernel patches so far, I think it is time to add at
least a kernel task.
Furthermore it isn't upstream yet and the target being 5.2 is a bit out
still, so I'd think you should target 19.10
** Also affects: lin
** Description changed:
When bit 29 is set in Test Control MSR register 0x33, a #AC execption
is generated for split locked accesses at all CPL irrespective of
CR0.AM or EFLAGS.AC.
This feature can help developers to capture memory accesses that across
cachelines with #LOCK assertio
patches to lkml along with kernel's patches.
Here is the link:
https://lkml.org/lkml/2019/3/1/749
It's along with kernel enabling patches.
** Description changed:
When bit 29 is set in Test Control MSR register 0x33, a #AC execption
is generated for split locked accesses at all CPL irresp
Oh mass update fail, this one actually is against kvm.
Which is the wrong package since several years actually.
Fixing that and setting qemu.
But it leaves the questions:
- need kernel changes/task as well as 4.20 is listed?
- will this be in qemu 2.13, if not can you provide a list of commits?
*
Hi,
title says KVM, but the bug is only against xen so far.
Will this need an "qemu (ubuntu)" and/or "linux (ubuntu)" task as well?
- kernel 4.20 is listed so I assume the latter.
- Comments do not yet mention Qemu
--
You received this bug notification because you are a member of Ubuntu
Bugs, w
** Description changed:
When bit 29 is set in Test Control MSR register 0x33, a #AC execption
- is generated for split locked accesses at all CPL irrespective of
- CR0.AM or EFLAGS.AC.
+ is generated for split locked accesses at all CPL irrespective of
+ CR0.AM or EFLAGS.AC.
This featur
11 matches
Mail list logo