From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id 10894740038 for ; Tue, 23 Apr 2024 15:07:13 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=O4w2qABNPwT5i1ZZrxfG3qfrDMvJx1GkKZe/NyhQYMc=; c=relaxed/simple; d=groups.io; h=Message-ID:Date:User-Agent:Subject:To:Cc:References:From:In-Reply-To:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Type:Content-Language; s=20240206; t=1713884832; v=1; b=msuSbw2ZWwh0KSD+qV3Z6bzbPlaU3LB6rQl9nWlN5RuF5KnZLwQlIGse2BtFAr/BWcD7a+lY Dhujm/7/Ue/9e7dC0oPhGW3UZ1W/djHrcv7X+n5lxQK4XKGGHemD/TJOcAo+6t9tk235JOd60T7 +/NK3vFCtfG04WoT/oRzAbLVPLizK6sAHgsnisOvRWhmaA/5ZO9Q9vnsGO0x9q3fhpA1grdK2NC qyDT6XAtU4z1KakGIDqNhYFOeUHm2NNQj0zcYnjpm1kzmpQ3MUYT6y1NF5iapimyGDEaeBm/O7V THrLHOY0MWPrqTeKaf8CqsbncXifvtMkKxyUua3jElXKw== X-Received: by 127.0.0.2 with SMTP id 9S3bYY7687511xq32UEALZt1; Tue, 23 Apr 2024 08:07:12 -0700 X-Received: from NAM04-MW2-obe.outbound.protection.outlook.com (NAM04-MW2-obe.outbound.protection.outlook.com [40.107.101.68]) by mx.groups.io with SMTP id smtpd.web11.21074.1713884831524716014 for ; Tue, 23 Apr 2024 08:07:11 -0700 X-Received: from IA1PR12MB6460.namprd12.prod.outlook.com (2603:10b6:208:3a8::13) by CH3PR12MB8283.namprd12.prod.outlook.com (2603:10b6:610:12a::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7472.44; Tue, 23 Apr 2024 15:07:06 +0000 X-Received: from IA1PR12MB6460.namprd12.prod.outlook.com ([fe80::c819:8fc0:6563:aadf]) by IA1PR12MB6460.namprd12.prod.outlook.com ([fe80::c819:8fc0:6563:aadf%5]) with mapi id 15.20.7472.044; Tue, 23 Apr 2024 15:07:05 +0000 Message-ID: <0b121f31-aefa-4b42-b54c-65f3e110e727@amd.com> Date: Tue, 23 Apr 2024 20:36:55 +0530 User-Agent: Mozilla Thunderbird Subject: Re: [edk2-devel] [PATCH v3 4/5] OvmfPkg/VirtHstiDxe: add code flash check To: Gerd Hoffmann Cc: devel@edk2.groups.io, Konstantin Kostiuk , Oliver Steffen , Jiewen Yao , Ard Biesheuvel , "Lendacky, Thomas" References: <20240422104729.502112-1-kraxel@redhat.com> <20240422104729.502112-5-kraxel@redhat.com> <1943e036-9a1f-4b11-ab12-e9df3670d264@amd.com> <601f21e4-752e-4cca-a62c-cf4a414b6e51@amd.com> From: "Aithal, Srikanth via groups.io" In-Reply-To: X-ClientProxiedBy: PN2P287CA0003.INDP287.PROD.OUTLOOK.COM (2603:1096:c01:21b::17) To IA1PR12MB6460.namprd12.prod.outlook.com (2603:10b6:208:3a8::13) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: IA1PR12MB6460:EE_|CH3PR12MB8283:EE_ X-MS-Office365-Filtering-Correlation-Id: 2e8e916c-e92b-40af-e1ff-08dc63a7093c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: =?utf-8?B?OTlMKzh3dlpYSzJvdnBPUmIyQXlRZ0Q5WHM3blpuU01VQkVldGxKS1I5cmlH?= =?utf-8?B?Y2xVRmU3K0xwWGFKcEhJMkJhOXBId3hQaTBIRVVwMmE2aEVmd3l6WE92WlJ4?= =?utf-8?B?U0JuQzZqMDhDQnBYSEQ4a2tWNTJYRGw3WHVvY2JuOTVucjBiSS8yMEl1YkFS?= =?utf-8?B?cmV6UXhaNm1Ta3Frdk84alBCbWt2RlZ2WlZJbTFyK1h1UjN0S2JlMGx3SWI5?= =?utf-8?B?LzVaY0FTTTZIeXU3ZWRFWGtidnB1UjFFblpqTTlxSWFrNnlRUW9xeUtxUGgw?= =?utf-8?B?UkRUamtiWUhWM2w4cENIRWM2MG91MXI1cEhTcjM5Y3Z1cGczeU05K2dmQ0Z3?= =?utf-8?B?T3VBeElXYyswMDdqSUVoOXpMRmlmTmxkcnhtMmV5OU1BbjJsdEh6dVI1ZVhK?= =?utf-8?B?OWxxcDNBajRDQ2J3TGtxWG1vT1hEWkVZbjNxYXRZREFsYlpIaWdISWs2N3ll?= =?utf-8?B?MHhzRVBraGNMZ2hNbUttSGlGczlqMk1xU1lQMk5VeTlEUllvUTA1Y0pHYXpU?= =?utf-8?B?bURISjF1MVVLdDZUenhNZFl5VDZFOXMzMnVBWEJ1Q1hYa2JIV3B3ZzZPM3du?= =?utf-8?B?YU96SHlVcGRiekUvM3VoaVZVQmpwTHhoWlg5MnFQWm9LclBhV1hVTW9NNVdw?= =?utf-8?B?N2t1TUZPNGp4TjlObU0ySy9SQWs4bkxueWdLVUtDTVNMYkFaK2VXK3hHMm9B?= =?utf-8?B?QU9lZEhmdFZOOE0rS3VVWWxXMHBuY1FTdVg5TWtpL0F3UjEybW9NMDE1aElM?= =?utf-8?B?ZkpSQ2RDeEdXK0s3Wi9oUlJaaWxYUG5VZmRVdXZ6THZUUnFveG85RFAvVmh6?= =?utf-8?B?MDQyMjRyVDA3RnBpN3kvYjc0Z1c1T1JRSUdac2pSeDl6bENSV1Q0TkVaejNw?= =?utf-8?B?dzI4ekkwREtPemVuWUExbzRMN1djaXdCclE3MmF2Mm85ZHQ4S3RETU9zc0M0?= =?utf-8?B?dXh1ZElRT05kZ1Z2RjYxTThvQ3lUOGxxeU1oQnFlWDZlUWpyMHVNMW5hRHJ3?= =?utf-8?B?a1BjOHoveUlDZ2h1dUxwNkgwWTFGWmZycjJUdC9tUFdacTA5NFdZbDFVcWhh?= =?utf-8?B?a0hhbDNWUXhyZWEzUDEyeHhPSXhUL294VWhhRmg2WTdNZk1BaWVlajVlQ256?= =?utf-8?B?RE5jbTNvOWdrL0F3UGttMlVqbHM5OUcvUnNuVnlJM2dDWjdHQ2ZwdDBHbUV1?= =?utf-8?B?S2o2cXdaMVkrMHlJcXZFTUU1UkZzVVZWUU83N2VEOVpZdkFKbnk4eHpkdXJZ?= =?utf-8?B?WElXWWJGOXp5OFNCQWJVeEtndHFBaTFlZm5MQmtEV080VHlGTzZtVzMzM09G?= =?utf-8?B?U2EyU01qdDE4Q3l6S01oYVNyMjc3ZEs0RDRSOStXM09vYjdlRVJFaDlXYXpm?= =?utf-8?B?TktCVUJRU2pnR25VUnFISEZtWlI1Y2pZWHJLakxwV0E4eTVGbHE2WU5RcGlZ?= =?utf-8?B?aVhDZVdYVlZwYVluS1ZLc3F4QkRnRDdTV3FJbVJWeGQzdTc3ZU5zMUd0TWoz?= =?utf-8?B?T0h4eDIzczhQVE4reHdoaTF1WldlUVVaRmhKVHExYUg2U1Z5MG41VWRiMjJ5?= =?utf-8?B?OXRiTm1TcVNCTGYrVkN5dk5DaWVhTFNqa1JCMm9Wbmkwd01EMS80Y1NsQ1lL?= =?utf-8?B?K2QybERoZUYvZHdoTXRrNzBGV2pwcWpJa1lkbkpPNmJRUUJvdk5ZcVhyZ05m?= =?utf-8?B?eGVjS1ExaTVWZi9OWDNSOVhFZldUcFBzSXFhWHB0a3JRQmJhSVNMODBnPT0=?= X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bTV2WWkwUWdRZzQ0RFo0aUdvU2x5d1FBNlpzM2k0QUhFS1liY0JlSjVlN1I5?= =?utf-8?B?VkZtL2YrOXNwTk1MYnMrVy81RzA1OUpiOTQrYlgvdzRqcDgwZEpLcGpOSHZX?= =?utf-8?B?TnczNGpmOW5ERXNBSEZCWDYyRi8zQkFXT2Vjc1NwSjhUQm9janYvNnlaRmta?= =?utf-8?B?U3NmWmg3RFB6bUc0SExVd01YRjNmeW90ZXRwSWpyanJ3ek1TclM1L0hqbzFh?= =?utf-8?B?bVNFUzFYcWlRRC91SURPK2lUZjRkNkxvUzByeTNzTXVwejArcXdVYkkvNFhP?= =?utf-8?B?Yy96L0VJOWhBRHJuMzU3ZWlxb2RHSnB5WXFrYnVSYUtHSEFaS213V3RnNE5a?= =?utf-8?B?aldHUGFoRXdzUG05c0dqSkVnLzZQZGtRVktrQ0ExdnJJMTNqSkl3YU9pWjJJ?= =?utf-8?B?bktQdTdJSW95TFBSOU53U3dYNHJVRjVQZjIvTWsvVGdiTHp6bEhDU3JUNkZQ?= =?utf-8?B?N2ZoUzZmWVIxRDZLa0tGTlErZ0g1R28rRVFvSnFDWTZCYVFiczl4YnVRSmpJ?= =?utf-8?B?S0s0RWhWbWZJVDhuRE1IYjhqdVg5R2t0QlFFcTdGQ0FWVXN5T2FLWXNBTDN4?= =?utf-8?B?NzdnZzJ5VmtZcnh4Y0VsSlhFQWNYWG4wblBYOXBvV2RiWGI4SkJhTHNKT3RN?= =?utf-8?B?eDBzWjcrekJIMWtiYUdObjJuY1NHc1AvYWUzandFSGY2eC9XTnJPWmkvNHBV?= =?utf-8?B?K1pxR0JwbWlDUGc3b2JSRVJYNStDK0kxUHZNU1pueEk0SnF3SHZYK0pYZ1R4?= =?utf-8?B?RmpWQWRncExacVUzakF6SUZYc3JPb0lZbXJWYjF5OVhRWUNGVjJGRWhHdzIy?= =?utf-8?B?VHIrOUEwb1VlZjlHV040MXJBcUw3cGRJekthaWIxdERYZ2RUczM4bjROS2Zn?= =?utf-8?B?ZS9OeGJ3K0w1azZsWVRwQ1c2Q0hKSlh2ZkQraDM2NkhFR0dGWEZNejdrMDdO?= =?utf-8?B?VEw1QlovYXZKU241RGV0cjg4TDhjZXBDcVZqY0FJTGhmSTU3NE9JQXZLNEN2?= =?utf-8?B?TFpETjdjV2tOS000YmRVK2hKNUNwSE1vVGNQQkhUUW1iYUJtMTg5U2NOT1BN?= =?utf-8?B?SWNHd2x1VGw2RVllUEZ2bW42OHlnVWs0ZDRrNmhKZkdXaDJ2Y0I5UGJScFhk?= =?utf-8?B?UWsrZ1drZWhZMURLR1c2RE91MnZEMitKL01EdWtLUjdzU3BEQnFwRFFhWFZr?= =?utf-8?B?aEU1MkNKNU40WUhRYmdXaTgwZndMUXZZV0t6TWQvZEFjdnFCdk9JQXBZd1lQ?= =?utf-8?B?N3ZNSUVHbzczTlQzS1p3OHpRVy9xSjhSMFcxZEovaVcrMHhtZGJuWGpSelpl?= =?utf-8?B?ZmFUVGNncnIxcUJuTVlLU0UyYmkzUmJ0WXVlU2swb1JSSlk1OU8vSGxvOWx4?= =?utf-8?B?RHNxbUcycWJEajI0M2ZyZXM5eGU2RVdvQlF0SEFFcmoxVDNWdWFrcmduaGRF?= =?utf-8?B?NWhTWkZCblE2QUFRZnBrbStLTDB2d2QrMlZld3IrWFo0enNlTUhEZkxGQUxS?= =?utf-8?B?OGpEd1kyZ2U2d3owT1ViRGxYZGVGaEhrMmhvS1VWUmphdHVtdTNCVGR6a3pr?= =?utf-8?B?OGtrN3JyVUIvd2xENTEwTk1CTTlBWDFqMzRodTFWczlWVjlWTTJ1RkM3NXdx?= =?utf-8?B?SEI4UVB5S3VobisvRUMybzZ3L200QVZCSUhwNmR3VGYvR3B0anFiVWFTOTBN?= =?utf-8?B?MVFJN210YWFMOWZHcExGN05wTzdFYnhxajYrVW9jVHRrTitNallaSmhPdkQw?= =?utf-8?B?bEFaRHBEa2RpdXpKS0RGOVJmN0dSd2ZhNW14QUMrM2s5S2pCalhvVUdyZXlj?= =?utf-8?B?b1gwVFJNWU5qVVFYR0VxeDE1bmtLOWNTS09Eb1AvZkpaSzN2aXJWU1o5Z01p?= =?utf-8?B?ZklKL0JoWlUzRDFjNERXeG40ZTYvTHZWMXVCdHFKVEk0TmgxZi9mQTZuZnJh?= =?utf-8?B?QTZpUEZXRjNvK2V2T2tia0F5M05lU3lvRGY4MWlidnB3SjZadTRHRDhDQzZv?= =?utf-8?B?NktNajJyd3U1T0paVHdEM0FUQ2N1c2pXNEZCL1F3cmNWaGdQRTZNcDlxYkJq?= =?utf-8?B?eGZMNCtzSFprL2ZUV1JidS9JMTI2UytkNXcyd2lBbFRiK1ZjalRBaEh3SXBm?= =?utf-8?Q?frqa7Y6d6uXeYMCAdlEQ6U0nn?= X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2e8e916c-e92b-40af-e1ff-08dc63a7093c X-MS-Exchange-CrossTenant-AuthSource: IA1PR12MB6460.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Apr 2024 15:07:04.9214 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: jvfxmAHF3QVPZx/Mq1N+rSxMO+d+rf+q7u0o2av8WPZXxM2aiDUMIsLk2LVSH49rs9ZBPwP4YtqrhH07rPoUvQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR12MB8283 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Tue, 23 Apr 2024 08:07:11 -0700 Resent-From: srikanth.aithal@amd.com Reply-To: devel@edk2.groups.io,srikanth.aithal@amd.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: ATD8qiOa9vXJ6gEzeaV0otJax7686176AA= Content-Type: multipart/alternative; boundary="------------oO4ScFUUbFI3qsXlQN5gUpZi" Content-Language: en-US X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=msuSbw2Z; dmarc=pass (policy=none) header.from=groups.io; spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io --------------oO4ScFUUbFI3qsXlQN5gUpZi Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: quoted-printable On 4/23/2024 8:01 PM, Gerd Hoffmann wrote: > On Tue, Apr 23, 2024 at 07:14:04PM +0530, Aithal, Srikanth wrote: >> Correcting. >> >> On 4/23/2024 7:09 PM, Aithal, Srikanth wrote: >>> Hello, >>> >>> Todays OVMF/edk2 master branch is breaking AMD SEV-ES guest boot with >>> OvmfX64 package, where as sev-es guest boots fine with AmdSev package. >>> >>> Git bisect pointed to below commit as bad, going back to previous commi= t >>> i.e ddc43e7a SEV-ES guest boots fine with OvmfX64 package: >> Git bisect pointed to below commit as bad, going back to previous commit= i.e >> ddc43e7a SEV-ES guest boots fine. With OVMF/edk2 master branch SEV-ES gu= est >> boots fine with *AmdSev *package: > The tests don't make much sense in confidential guests (both sev and > tdx). Which why the driver is not included in the AmdSevPkg builds. > > Not activating the driver in confidential guests should fix that, test > patch below. > > take care, > Gerd > > diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf b/OvmfPkg/VirtHstiDxe/Vi= rtHstiDxe.inf > index 9514933011e8..b5c237288766 100644 > --- a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf > +++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf > @@ -49,6 +49,7 @@ [FeaturePcd] > gUefiOvmfPkgTokenSpaceGuid.PcdSmmSmramRequire > =20 > [Pcd] > + gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr > gUefiOvmfPkgTokenSpaceGuid.PcdBfvBase > gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase > =20 > diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c b/OvmfPkg/VirtHstiDxe/Virt= HstiDxe.c > index b6e53a1219d1..efaff0d1f3cb 100644 > --- a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c > +++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c > @@ -17,6 +17,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent > #include > #include > #include > +#include > #include > =20 > #include > @@ -140,6 +141,11 @@ VirtHstiDxeEntrypoint ( > EFI_STATUS Status; > EFI_EVENT Event; > =20 > + if (PcdGet64 (PcdConfidentialComputingGuestAttr)) { > + DEBUG ((DEBUG_INFO, "%a: confidential guest\n", __func__)); > + return EFI_UNSUPPORTED; > + } > + > DevId =3D VirtHstiGetHostBridgeDevId (); > switch (DevId) { > case INTEL_82441_DEVICE_ID: Thanks, tested this patch on top of current edk2 master. Issue is=20 resolved, am able to boot sev-es guests. Tested-by: Srikanth Aithal -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118173): https://edk2.groups.io/g/devel/message/118173 Mute This Topic: https://groups.io/mt/105667072/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- --------------oO4ScFUUbFI3qsXlQN5gUpZi Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable


On 4/23/2024 8:01 PM, Gerd Hoffmann wrote:
On Tue, Apr 23, 2024 at 07:14:=
04PM +0530, Aithal, Srikanth wrote:
Correcting.

On 4/23/2024 7:09 PM, Aithal, Srikanth wrote:
Hello,

Todays OVMF/edk2 master branch is breaking AMD SEV-ES guest boot with
OvmfX64 package, where as sev-es guest boots fine with AmdSev package.

Git bisect pointed to below commit as bad, going back to previous commit
i.e ddc43e7a SEV-ES guest boots fine with OvmfX64 package:
Git bisect pointed to below =
commit as bad, going back to previous commit i.e
ddc43e7a SEV-ES guest boots fine. With OVMF/edk2 master branch SEV-ES guest
boots fine with *AmdSev *package:
The tests don't make much sense in confidential guests (both sev and
tdx).  Which why the driver is not included in the AmdSevPkg builds.

Not activating the driver in confidential guests should fix that, test
patch below.

take care,
  Gerd

diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf b/OvmfPkg/VirtHstiDxe/Virt=
HstiDxe.inf
index 9514933011e8..b5c237288766 100644
--- a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
+++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.inf
@@ -49,6 +49,7 @@ [FeaturePcd]
   gUefiOvmfPkgTokenSpaceGuid.PcdSmmSmramRequire
=20
 [Pcd]
+  gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr
   gUefiOvmfPkgTokenSpaceGuid.PcdBfvBase
   gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashNvStorageVariableBase
=20
diff --git a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c b/OvmfPkg/VirtHstiDxe/VirtHs=
tiDxe.c
index b6e53a1219d1..efaff0d1f3cb 100644
--- a/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c
+++ b/OvmfPkg/VirtHstiDxe/VirtHstiDxe.c
@@ -17,6 +17,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
 #include <Library/MemoryAllocationLib.h>
 #include <Library/UefiBootServicesTableLib.h>
 #include <Library/UefiLib.h>
+#include <Library/PcdLib.h>
 #include <Library/PlatformInitLib.h>
=20
 #include <IndustryStandard/Hsti.h>
@@ -140,6 +141,11 @@ VirtHstiDxeEntrypoint (
   EFI_STATUS                           Status;
   EFI_EVENT                            Event;
=20
+  if (PcdGet64 (PcdConfidentialComputingGuestAttr)) {
+    DEBUG ((DEBUG_INFO, "%a: confidential guest\n", __func__));
+    return EFI_UNSUPPORTED;
+  }
+
   DevId =3D VirtHstiGetHostBridgeDevId ();
   switch (DevId) {
     case INTEL_82441_DEVICE_ID:

Thanks, tested this patch on top of current edk2 master. Issue is resolved, am able to boot sev-es guests.

Tested-by: Srikanth Aithal <sraitha=
l@amd.com>


    
_._,_._,_

Groups.io Links:

=20 You receive all messages sent to this group. =20 =20

View/Reply Online (#118173) | =20 | Mute= This Topic | New Topic
Your Subscriptio= n | Contact Group Owner | Unsubscribe [rebecca@openfw.io]

_._,_._,_
--------------oO4ScFUUbFI3qsXlQN5gUpZi--