From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.158.5]) by mx.groups.io with SMTP id smtpd.web11.3665.1626756961793764018 for ; Mon, 19 Jul 2021 21:56:02 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@ibm.com header.s=pp1 header.b=TRnRvFan; spf=pass (domain: linux.ibm.com, ip: 148.163.158.5, mailfrom: dovmurik@linux.ibm.com) Received: from pps.filterd (m0098413.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 16K4YJ3X020331; Tue, 20 Jul 2021 00:56:00 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=subject : to : references : cc : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=S9JivsCiyLlz5gSq/LKaXAoPqi8w9MD0pLXelQUkEeY=; b=TRnRvFanixwu5Y2nupspD61S1w0LjBHdq1zes5pQ18BFAE5yQ3q38PV17UyIzVJOWu0i D1+vBs2NDdBy3dYswHGA+XVvvqXSjN3Vcz073MOfukil9aQhet6X0FQr39gqrZgU47j5 9FCo9GRy77FuhVsV1mbd2D9X3045v5J3JrDYnsxDp37c4sG3rOg0FYWFYtVV3bhJsLiO ASeFES62yHNuhP6Kg66K/tGFvMIfue1h8vNPhIrQBINVq7VpmiMjTWC2WTTs9TN/hpif yT+5qpn9ohn42z6yGGRVM+DjYLy5RHddghu5Gj7J0WoNAk4t4mBWfRChC+Tc45tnRBdi +A== Received: from ppma02dal.us.ibm.com (a.bd.3ea9.ip4.static.sl-reverse.com [169.62.189.10]) by mx0b-001b2d01.pphosted.com with ESMTP id 39wp21acs0-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 20 Jul 2021 00:56:00 -0400 Received: from pps.filterd (ppma02dal.us.ibm.com [127.0.0.1]) by ppma02dal.us.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 16K4l9qL022691; Tue, 20 Jul 2021 04:56:00 GMT Received: from b01cxnp22035.gho.pok.ibm.com (b01cxnp22035.gho.pok.ibm.com [9.57.198.25]) by ppma02dal.us.ibm.com with ESMTP id 39vuk4nvcu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 20 Jul 2021 04:56:00 +0000 Received: from b01ledav002.gho.pok.ibm.com (b01ledav002.gho.pok.ibm.com [9.57.199.107]) by b01cxnp22035.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 16K4tx7v38011260 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 20 Jul 2021 04:55:59 GMT Received: from b01ledav002.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2873D124053; Tue, 20 Jul 2021 04:55:59 +0000 (GMT) Received: from b01ledav002.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 7147B12405C; Tue, 20 Jul 2021 04:55:58 +0000 (GMT) Received: from [9.65.195.237] (unknown [9.65.195.237]) by b01ledav002.gho.pok.ibm.com (Postfix) with ESMTP; Tue, 20 Jul 2021 04:55:58 +0000 (GMT) Subject: Re: [edk2-devel] [PATCH v2 03/11] OvmfPkg: PlatformBootManagerLibGrub: Allow executing kernel via fw_cfg To: chris.willing@linux.com, devel@edk2.groups.io References: <23418.1626699362007911011@groups.io> <98ca559a-edb9-8182-1de7-4a492762103c@linux.ibm.com> <677eb4b4-98cc-dea5-0cd2-882a504f3125@linux.com> Cc: Dov Murik From: "Dov Murik" Message-ID: <2c705130-6183-5fb8-c1a5-373fd41a1ad7@linux.ibm.com> Date: Tue, 20 Jul 2021 07:55:56 +0300 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: <677eb4b4-98cc-dea5-0cd2-882a504f3125@linux.com> X-TM-AS-GCONF: 00 X-Proofpoint-GUID: SFkUZYdgJhb1HrCNe6MIMWbUi_I0kANH X-Proofpoint-ORIG-GUID: SFkUZYdgJhb1HrCNe6MIMWbUi_I0kANH X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391,18.0.790 definitions=2021-07-20_01:2021-07-19,2021-07-20 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 malwarescore=0 phishscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 mlxscore=0 bulkscore=0 lowpriorityscore=0 clxscore=1015 suspectscore=0 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2107200024 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit On 20/07/2021 1:36, Christoph Willing wrote: > On 20/7/21 3:58 am, Dov Murik wrote: >> >> >> On 19/07/2021 15:56, Christoph Willing wrote: >>> Thanks for the clarification Dov. >>> >>> I've been trying with just "normal" VMs, not SEV. I did already find and try the confidential-containers-demo sev-hashes-v2 branch but it didn't help - not surprising if it's not relevant to normal VMs. >>> >>> Do you know whether this functionality (-kernel, -initrd, -append options) is actually supposed to work in normal VMs at the moment? The only conditions under which it works here with qemu-6.0.0 is with vUDK2017 & 2018 and an old ovmf binary package from kraxel.og dated 2017. Anything built from the edk2 master branch has failed when using those qemu options, although all the same builds work perfectly using the VMs' internal kernels & initrds. I've also extracted OVMF files from the current kraxel.org package as well as Ubuntu's (hirsute) package and these also fail the same way i.e. kernel boots and initrd works (loads modules) but then the VM filesystem doesn't seem to be found (no /dev/sdX exists to mount the filesystem root). >>> >>> I guess this could be a qemu problem but since it works with some (old) udk/edk2 versions, I thought I'd look here first. >>> >> >> >> Can you please try with edk2 commit d1fc3d7ef3cb - just before we did >> some changes around this QEMU-interop code in OVMF? >> > > I just tried a build at d1fc3d7ef3cb... with the same result. Works with > VM's internal kernel & initrd but not with external (using -kernel, > -initrd & -append options). > > As soon as I revert to OVMF files (CODE & VARS) from vUDK2018, all works > as expected with external kernel & initrd. > > Since this problem seems to go back to around 2018, is it better to > report in bugzilla? I think so. Be sure to include full logs as much as possible and details about the image you're trying to start; it seems to me that if the kernel starts and initrd is mounted etc then both QEMU and OVMF are doing their part, and there's something else that fails (but then again, reverting to an old OVMF does solve it... IDK). -Dov > > Thanks, > chris >