Received: by 2002:a17:90b:8d0:0:0:0:0 with SMTP id ds16csp371917pjb; Wed, 22 Jul 2020 02:07:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxjB6CNNYauWssIZ1EcK/bYkBLmFicTs+FCQHZPJroTlXe69MhgTdudrG+TLwWpU9aNnWmW X-Received: by 2002:a05:6402:1ad9:: with SMTP id ba25mr30107664edb.74.1595408842745; Wed, 22 Jul 2020 02:07:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595408842; cv=none; d=google.com; s=arc-20160816; b=kUx6pJRelYPI6bJ6LY9P3NoEAC1WGep58ipF7uzHPe2NrrglHe/UU9zenWVaGZGqVG YQ3yuR5B/4kgJ97qBhBtfSNBoaOAak10HIX3UcPflhenu465qRTqqc2NWZwYeg80AARH nhTm+csVsCHk8GdJdsEl3jrLibPnN393TZYuwQDdnrPpd6XFrp6ozMH2Mfv68Z5f7kqd 1LM6NP4lRlyPDI3BisGPYKoaEAEBb9MLRnzFAKwv6ztfX7kmv/YlPmfA7Q191tD+vAnJ j3N986MG480SwUTOa3gUSuN2DTaBMNKLjHXUdqgZsc+EdnkvqipaQcnuIGZQrx8goweH sARg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=rQ8TKADMSWr37/mnmtCQ764b6me3Miqn3mhhkj8jp58=; b=R1T4NOYO5ZynBpGn9RUegQ0qOjlbTg7PuP2xuDbwESCK4F35rAAfpeZGSIgZWfF3l4 pThDNayJFLq/3CaLm+QlqUC4xWUSGV3YzoMcKclgJQCIXZUIeCBt6kAVPaIumVw1yGkS 1EV68EKM0xkcN+67CsVX7/wi4hT9h/cl4Sh7TkIfKRZkamf1CE8VLd22Leth9ZloXKEH aHlVgqzgenY2PuhhhVFM8qYaIsQbWw10WARRVO9quX2PfeulHWYuJqqZJ7kLsDlJvm4G TIvSUKtjH9PrUPArSnDvdf1gtdBmVW5VpxUS+dkECA4dQn/Dku8yTE1EdMb6oH22PoM9 QtOg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 25si14495179ejx.187.2020.07.22.02.07.00; Wed, 22 Jul 2020 02:07:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730715AbgGVJEr (ORCPT + 99 others); Wed, 22 Jul 2020 05:04:47 -0400 Received: from mx2.suse.de ([195.135.220.15]:57108 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728360AbgGVJEr (ORCPT ); Wed, 22 Jul 2020 05:04:47 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 75BEDAF16; Wed, 22 Jul 2020 09:04:52 +0000 (UTC) Date: Wed, 22 Jul 2020 11:04:42 +0200 From: Joerg Roedel To: Erdem Aktas Cc: Peter Zijlstra , Joerg Roedel , x86@kernel.org, hpa@zytor.com, Andy Lutomirski , Dave Hansen , Jiri Slaby , Dan Williams , Tom Lendacky , Juergen Gross , Kees Cook , David Rientjes , Cfir Cohen , Masami Hiramatsu , Mike Stunes , Sean Christopherson , Martin Radev , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: Re: [PATCH v4 00/75] x86: SEV-ES Guest Support Message-ID: <20200722090442.GI6132@suse.de> References: <20200714120917.11253-1-joro@8bytes.org> <20200715092456.GE10769@hirez.programming.kicks-ass.net> <20200715093426.GK16200@suse.de> <20200715095556.GI10769@hirez.programming.kicks-ass.net> <20200715101034.GM16200@suse.de> <20200721124957.GD6132@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Erdem, On Tue, Jul 21, 2020 at 09:48:51AM -0700, Erdem Aktas wrote: > Yes, I am using OVMF with SEV-ES (sev-es-v12 patches applied). I am > running Ubuntu 18.04 distro. My grub target is x86_64-efi. I also > tried installing the grub-efi-amd64 package. In all cases, the grub is > running in 64bit but enters the startup_32 in 32 bit mode. I think > there should be a 32bit #VC handler just something very similar in the > OVMF patches to handle the cpuid when the CPU is still in 32bit mode. > As it is now, it will be a huge problem to support different distro images. > I wonder if I am the only one having this problem. I havn't heard from anyone else that the startup_32 boot-path is being used for SEV-ES. What OVMF binary do you use for your guest? In general it is not that difficult to support that boot-path too, but I'd like to keep that as a future addition, as the patch-set is already quite large. In the startup_32 path there is already a GDT set up, so whats needed is an IDT and a 32-bit #VC handler using the MRS-based protocol (and hoping that there will only be CPUID intercepts until it reaches long-mode). Regards, Joerg