[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-10-08 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: libvirt (Ubuntu Bionic) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-10-08 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: qemu (Ubuntu Bionic) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title:

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed for that release ** Changed in: libvirt (Ubuntu Eoan) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-08-18 Thread Brian Murray
The Eoan Ermine has reached end of life, so this bug will not be fixed for that release ** Changed in: qemu (Ubuntu Eoan) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-05-26 Thread panticz.de
A quick workaround for those who need hle and rtm CPU flags back is to set the tsx=on kernel boot parameter: # /etc/default/grub ... GRUB_CMDLINE_LINUX_DEFAULT="... tsx=on" ... update-grub Tested on Ubuntu 20.04 with kernel 5.4.0-31-generic: # uname -a Linux com1-dev 5.4.0-31-generic

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-27 Thread Christian Ehrhardt 
A while back Marc checked the case and realize that backporting the qemu changes without anything in libvirt would make no sense - comment #21. Now the things in libvirt exist, which is a step forward. This still will be no transparent solution, people will have to switch types if they can't run

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-27 Thread Janåke Rönnblom
Will these changes go into 18.04.x also? -J -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and rtm disabled for security are present in

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-26 Thread Launchpad Bug Tracker
This bug was fixed in the package libvirt - 6.0.0-0ubuntu6 --- libvirt (6.0.0-0ubuntu6) focal; urgency=medium * d/p/ubuntu/lp-1867460-*: fix domcapabilities before capabilities and binary autodetection in general (LP: #1867460) * d/p/stable/lp-1868539-*: stabilize libvirt by

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-26 Thread Christian Ehrhardt 
Upstream committed as: dd17a4eba8 cpu_map: Add more -noTSX x86 CPU models f4914045c2 cpu_map: Add element to x86 CPU model definitions 7cd896ef31 cpu_x86: Honor CPU models' element 17cdefe5f1 cpu_map: Don't use new noTSX models for host-model CPUs I have replaced my patches with the final ones

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-25 Thread Christian Ehrhardt 
Since tests are good I asked if they are ready to be committed and got: [13:31] cpaelzer_: I'll commit it later today With that I can later on replace the preliminary patches with the final ones before an upload. -- You received this bug notification because you are a member of Ubuntu Bugs,

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-25 Thread Christian Ehrhardt 
FYI Regression test is fine on this build, but waiting a bit to give it a chance to be upstream committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and rtm

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-23 Thread Christian Ehrhardt 
Tests with the PPA build using the patches sent by Jiri (and my addition of the noTSX types): #1 virsh capabilities Before: Broadwell-noTSX-IBRS + 33 features After: Skylake-Client-noTSX-IBRS +24 features => good #2 virsh domcapabilities Before: Skylake-Client-IBRS + 16 features After:

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-23 Thread Christian Ehrhardt 
PPA: https://launchpad.net/~ci-train-ppa-service/+archive/ubuntu/3986 MP: https://code.launchpad.net/~paelzer/ubuntu/+source/libvirt/+git/libvirt/+merge/380942 ** Merge proposal linked: https://code.launchpad.net/~paelzer/ubuntu/+source/libvirt/+git/libvirt/+merge/380942 -- You received

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-23 Thread Christian Ehrhardt 
Updated task state to reflect my work with upstream to get libvirt to know about this change. ** Changed in: libvirt (Ubuntu) Assignee: Ubuntu Security Team (ubuntu-security) => Christian Ehrhardt  (paelzer) ** Changed in: libvirt (Ubuntu) Status: Won't Fix => Triaged -- You

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-13 Thread Christian Ehrhardt 
FYI I pinged on the list as I see that "auto-detect other cpu types" not linked to the submission I made. But OTOH we can't go ahead integrating this in Ubuntu ahead of time while not accepted or we would risk to diverge making things even worse ... -- You received this bug notification because

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-13 Thread Christian Ehrhardt 
diverge ... details of names CPU types I mean, breaking cross system and cross release behavior -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and rtm disabled for

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-11 Thread Christian Ehrhardt 
Now reply yet on v2: https://www.redhat.com/archives/libvir-list/2020-March/msg00296.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and rtm disabled for

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-10 Thread Christian Ehrhardt 
FYI: discussion goes on, v2 now submitted to the thread on the ML -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and rtm disabled for security are present in

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-06 Thread Christian Ehrhardt 
Submitted to upstream libvirt as: => https://www.redhat.com/archives/libvir-list/2020-March/msg00175.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and rtm

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-04 Thread Christian Ehrhardt 
List of types to consider adding by comparing qemu qmp output of cpu probing with cpu_maps of libvirt: -Cascadelake-Server-noTSX -Icelake-Client-noTSX -Icelake-Server-noTSX -Skylake-Server-noTSX-IBRS -Skylake-Client-noTSX-IBRS -- You received this bug notification because you are a member of

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-04 Thread Christian Ehrhardt 
Upstream agrees, we need to add new types to libvirt. The Discussion is still ongoing but I'm prepping a submission of those types ... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title:

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-04 Thread Christian Ehrhardt 
FYI: bug 1861643 might be a new symptom of the same root cause. If that is confirmed we might bump this for re-considering our options ... again (at least going forward we might want to add Skylake-Client-noTSX-IBRS and such to qemu in Focal). -- You received this bug notification because you

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-03-04 Thread Christian Ehrhardt 
.. or adding the types to libvirt, whatever is needed to at least limit the impact of dropping hle/rtm in 20.04 ... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-02-26 Thread Christian Ehrhardt 
** Changed in: libvirt (Ubuntu) Status: Confirmed => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and rtm disabled for security are present in

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-02-12 Thread Marc Deslauriers
I don't know what the way forward is to resolve this issue. While upstream qemu has added some new CPU models, "Skylake-Client-noTSX- IBRS", "Skylake-Server-noTSX-IBRS", etc, libvirt has not. If I do add these to libvirt, we will need to carry them forward as a delta to upstream possibly forever.

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-02-11 Thread Marc Deslauriers
These look like the list of commits to support recent kernel/microcode feature updates: qemu: https://git.qemu.org/?p=qemu.git;a=commit;h=7fac38635e1cc5ebae34eb6530da1009bd5808e4 (taa) https://git.qemu.org/?p=qemu.git;a=commit;h=0723cc8a5558c94388db75ae1f4991314914edd3 (vmx)

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2020-01-14 Thread Christian Ehrhardt 
FYI: I pinged the security Team again on this one to be sure it doesn't fall through the cracks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and rtm disabled for

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-12-09 Thread Janåke Rönnblom
Hi, There is also the microcode package where Intel has published and updated these flags. So this in combination with the kernel might cause these errors. -J -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-12-09 Thread Christian Ehrhardt 
Oh so you seem to have a combination of HW/FW/Kernel that gets along with it. But for e.g. a Hosting environment please be aware of the "SMT vulnerable" unless you don't have SMT disabled anyway. Since different systems (HW/FW/Kernel) will behave differently I think this issue isn't resolved

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-12-09 Thread Nobuto Murata
Here you are: $ grep . /sys/devices/system/cpu/vulnerabilities/* /sys/devices/system/cpu/vulnerabilities/itlb_multihit:KVM: Mitigation: Split huge pages /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-12-09 Thread Christian Ehrhardt 
@Nobuto: Interesting what is your: grep . /sys/devices/system/cpu/vulnerabilities/* -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and rtm disabled for security are

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-12-09 Thread Nobuto Murata
> @Nobuto - has your system any of the above kernel parameters set manually? No, we don't have any flags in kernel parameters related to tsx or similar. FWIW, I haven't tested any older kernel to check if those flags are available. But we are using Intel(R) Xeon(R) Gold 6150 CPU @ 2.70GHz. --

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-12-08 Thread Christian Ehrhardt 
You said this might have been resolved differently anyway with the newest kernel having again hle/rtm enabled - I haven't heard about it but that would probably be even better. Lets see on the kernel side. - Fixes for CVE-2019-11135 got added in 4.15.0-69.78 - This was reported against 4.15.0-70

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-12-07 Thread Nobuto Murata
I'm not sure I'm following the discussion here, but I see hle and rtm flags with the latest security update for bionic GA kernel. So looks like the issue is not reproducible any longer. Am I missing something? $ dpkg -l | grep linux-image ii linux-image-4.15.0-72-generic 4.15.0-72.81

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-22 Thread Christian Ehrhardt 
FYI: I got message from sbeattie that security will take a look at the backports for these qemu fixes. For libvirt we can check again then if the types got updated, and if no one did I can send something there as well. -- You received this bug notification because you are a member of Ubuntu

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-22 Thread David Coronel
Subscribed ~field-medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853200 Title: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml To manage

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-21 Thread Christian Ehrhardt 
This was now accepted upstream in qemu. [1] is the merge commit containing the new names discussed here 02fa60d1 / 9ab2237f but also tsx-ctrl which seems to be part of the overall tsx handlign and not yet part of the patches of last week 2a9758c5. @security - are you gonna take a look at

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-20 Thread Corey Bryant
Patches are in progress for new CPU models with TSX disabled: https://lists.gnu.org/archive/html/qemu-devel/2019-11/msg03323.html (Thanks Cpaelzer and Kashyap) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-20 Thread Kashyap Chamarthy
A small addendum to what Corey said: Upstream QEMU will mostly providing new named CPU models with 'hle' and 'rtm' CPU flags turned off. Keep an eye on the upstream 'qemu-devel' list :-) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-20 Thread Steve Beattie
@Cpaelzer there were alas no discussions pre-disclosure beyond adding the basic taa-no and pschange-mc-no flag support to qemu. We can definitely add text to the USN about this; let's get it in the KnowledgeBase article first since that's easier to modify. -- You received this bug notification

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-20 Thread Corey Bryant
I chatted with Kashyap in #openstack-nova and he has a blueprint up for disabling CPU feature flags at: https://blueprints.launchpad.net/nova/+spec/allow-disabling-cpu-flags Kashyap mentioned an option for now: One (very valid) 'workaround' is that have QEMU add new "named CPU models" to remove

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-20 Thread Corey Bryant
There's a related fix for enabling CPU feature flags that landed in upstream nova and charm-nova-compute via LP: #1750829 as a result of Meltdown. There's mention in the upstream fix [1] that a future patch will allow disabling of CPU feature flag but I'm not sure if that has landed. I'll dig

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-19 Thread Christian Ehrhardt 
@UCA-Team I'm also subscribing the UCA Team as I personally only know about [1] which allows you to use named CPU models. I expect there already is some general pattern established to handle e.g. the older MDS which if you look at "Configuration as a Hypervisor" at [2] also needs such

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-19 Thread Christian Ehrhardt 
I found no changes since the CRD nor a discussion on the ML of qemu or libvirt. There are the backported fixes that add taa-no and pschange-mc-no to qemu - but nothing touches hle/rtm yet. The general answer of of the virt stack avoiding type proliferation are versioned CPU models. =>

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-19 Thread Christian Ehrhardt 
Hi Dave, IIRC Openstack either tries to determine the least common denominator (in cpu features) or whatever you pass to hi, in your case that was: [libvirt] cpu_mode = custom cpu_model = Skylake-Server-IBRS And your guest definition won't change after the initial definition. Even if you would

[Bug 1853200] Re: cpu features hle and rtm disabled for security are present in /usr/share/libvirt/cpu_map.xml

2019-11-19 Thread David Coronel
** Description changed: When trying to launch an instance in OpenStack Queens on Ubuntu 18.04 with the new kernels, this error happens: Error: Failed to perform requested operation on instance "david", the instance has an error status: Please try again later [Error: Exceeded maximum