Re: [edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-06 Thread Laszlo Ersek
On 03/02/18 16:21, Brijesh Singh wrote: > > > On 03/01/2018 06:03 PM, Laszlo Ersek wrote: > ... > >> >> I regression-tested my usual non-SEV guests (with Brijesh's v2 2/2 patch >> applied on top, from the above-referenced series), which covers i440fx >> (no SMM, X64), q35 (SMM, IA32 and

Re: [edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-05 Thread Laszlo Ersek
On 03/05/18 15:44, Brijesh Singh wrote: > On 03/05/2018 08:00 AM, Laszlo Ersek wrote: >> QEMU exits with the following error for me: >> >> 2018-03-05T13:40:12.478835Z qemu-system-x86_64: sev_ram_block_added: >> failed to register region (0x7f3df3e0+0x2) >> 2018-03-05T13:40:12.489183Z

Re: [edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-05 Thread Brijesh Singh
One more comment. On 03/05/2018 08:44 AM, Brijesh Singh wrote: >> \    -device scsi-hd,bus=scsi0.0,channel=0,scsi-id=0,lun=0,drive=drive-scsi0-0-0-0,id=scsi0-0-0-0,bootindex=1 \    -netdev tap,fd=26,id=hostnet0,vhost=on,vhostfd=28 \    -device

Re: [edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-05 Thread Brijesh Singh
Hi Laszlo, On 03/05/2018 08:00 AM, Laszlo Ersek wrote: On 03/02/18 14:17, Brijesh Singh wrote: On 3/2/18 5:53 AM, Laszlo Ersek wrote: Do you have (maybe updated) instructions for setting up the SEV host? What are the latest bits that are expected to work together? For host kernel: -

Re: [edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-05 Thread Laszlo Ersek
On 03/02/18 14:17, Brijesh Singh wrote: > On 3/2/18 5:53 AM, Laszlo Ersek wrote: >> Do you have (maybe updated) instructions for setting up the SEV host? >> What are the latest bits that are expected to work together? > For host kernel: > - use recent kvm/master > - make sure following kernel

Re: [edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-05 Thread Laszlo Ersek
On 03/02/18 14:17, Brijesh Singh wrote: > > > On 3/2/18 5:53 AM, Laszlo Ersek wrote: >> On 03/02/18 02:16, Brijesh Singh wrote: >>> >>> On 3/1/18 6:03 PM, Laszlo Ersek wrote: I also tried to test the series with SEV guests (again with Brijesh's v2 2/2 patch applied on top).

Re: [edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-02 Thread Brijesh Singh
On 03/01/2018 06:03 PM, Laszlo Ersek wrote: ... I regression-tested my usual non-SEV guests (with Brijesh's v2 2/2 patch applied on top, from the above-referenced series), which covers i440fx (no SMM, X64), q35 (SMM, IA32 and IA32X64), Fedora and Windows, normal boot and S3. I also tried to

Re: [edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-02 Thread Brijesh Singh
On 3/2/18 5:53 AM, Laszlo Ersek wrote: > On 03/02/18 02:16, Brijesh Singh wrote: >> >> On 3/1/18 6:03 PM, Laszlo Ersek wrote: >>> I also tried to test the series with SEV guests (again with Brijesh's v2 >>> 2/2 patch applied on top). Unfortunately, I didn't get good results with >>> or without

Re: [edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-02 Thread Laszlo Ersek
On 03/02/18 02:16, Brijesh Singh wrote: > > > On 3/1/18 6:03 PM, Laszlo Ersek wrote: >> I also tried to test the series with SEV guests (again with Brijesh's v2 >> 2/2 patch applied on top). Unfortunately, I didn't get good results with >> or without SMM. Without SMM, the guest OS boots to a

Re: [edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-01 Thread Brijesh Singh
On 3/1/18 6:03 PM, Laszlo Ersek wrote: > Repo: https://github.com/lersek/edk2.git > Branch: sev_smram_save_state_map > > This patch series replaces the following patch from Brijesh: > > [PATCH v2 1/2] OvmfPkg/AmdSevDxe: Clear the C-bit from SMM Saved State >

[edk2] [PATCH 00/20] OvmfPkg: SEV: decrypt the initial SMRAM save state map for SMBASE relocation

2018-03-01 Thread Laszlo Ersek
Repo: https://github.com/lersek/edk2.git Branch: sev_smram_save_state_map This patch series replaces the following patch from Brijesh: [PATCH v2 1/2] OvmfPkg/AmdSevDxe: Clear the C-bit from SMM Saved State