From: "Brijesh Singh" <brijesh.singh@amd.com>
To: "Xu, Min M" <min.m.xu@intel.com>,
"devel@edk2.groups.io" <devel@edk2.groups.io>,
Vishal Annapurve <vannapurve@google.com>
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>,
"Justen, Jordan L" <jordan.l.justen@intel.com>,
Gerd Hoffmann <kraxel@redhat.com>,
Erdem Aktas <erdemaktas@google.com>,
James Bottomley <jejb@linux.ibm.com>,
"Yao, Jiewen" <jiewen.yao@intel.com>,
Tom Lendacky <thomas.lendacky@amd.com>
Subject: Re: [edk2-devel] [PATCH V6 1/1] OvmfPkg: Enable TDX in ResetVector
Date: Sat, 18 Sep 2021 06:30:20 -0500 [thread overview]
Message-ID: <3069705d-bf76-bcb7-e94f-dec9d19b47d6@amd.com> (raw)
In-Reply-To: <PH0PR11MB5064F1E46F0C8989E5D919C8C5DE9@PH0PR11MB5064.namprd11.prod.outlook.com>
Hi Min,
On 9/18/21 12:16 AM, Xu, Min M wrote:
> Hi, Brijesh
>
> On September 17, 2021 11:52 PM, Brijesh Singh wrote:
>> Hi Min,
>>
>> On 9/17/21 7:55 AM, Xu, Min M wrote:
>> ...
>>
>>> As I mentioned in my last mail, in the beginning I missed the limitation of
>> smsw.
>>> So I update the code (ResetVectorVtf0.asm) as below using mov CRx.
>>> <1> BITS 16
>>> 176 00000800 0F20C0 <1> mov eax, cr0 <-- previously it
>> was smsw
>>> 177 00000803 A801 <1> test al, 1
>>> 178 00000805 7405 <1> jz .Real
>>> 179 <1> BITS 32
>>> 180 00000807 E951FFFFFF <1> jmp Main32
>>> 181 <1> BITS 16
>>> 182 <1> .Real:
>>> 183 0000080C E939FF <1> jmp EarlyBspInitReal16
>>>
>>> I test the code in a AMD SEV server and try to launch a SEV guest. This time
>> it stuck at the *mov eax, cr0*.
>>> I am curious if *mov eax, cr0* works in real mode in a SEV guest?
>>> I also test the code in a legacy vm guest and td guest, all passed.
>>> Did I miss something?
>>>
>> Hmm, I am not aware of any limitation w.r.t encrypted VMs. I just added the
>> below code in my branch and I do not see any issues, my SEV, SEV-ES and
>> SEV-SNP all are able to boot fine. And KVM trace confirms that code it read
>>
>> diff --git a/OvmfPkg/ResetVector/Ia16/ResetVectorVtf0.asm
>> b/OvmfPkg/ResetVector/Ia16/ResetVectorVtf0.asm
>> index f0e509d0672e..98e34332b04c 100644
>> --- a/OvmfPkg/ResetVector/Ia16/ResetVectorVtf0.asm
>> +++ b/OvmfPkg/ResetVector/Ia16/ResetVectorVtf0.asm
>> @@ -175,9 +175,21 @@ resetVector:
>> ;
>> ; This is where the processor will begin execution
>> ;
>> +%ifdef ARCH_IA32
>> nop
>> nop
>> jmp EarlyBspInitReal16
>> +%else
>> + mov eax, cr0
>> + test al, 1
>> + jz .Real
>> +BITS 32
>> + hlt
>> + ;jmp Main32
>> +BITS 16
>> +.Real:
>> + jmp EarlyBspInitReal16
>> +%endif
>>
>> ALIGN 16
>>
>>
>> And KVM trace:
>>
>> kvm_exit: vcpu 0 reason npf rip 0xfff0 info1 0x0000000500000014 info2
>> 0x00000000fffff000 intr_info 0x00000000 error_code 0x00000000
>> kvm_page_fault: address fffff000 error_code 500000014
>> kvm_entry: vcpu 0, rip 0xfff0
>> kvm_exit: vcpu 0 reason read_cr0 rip 0xfff0 info1 0x8000000000000000
>> info2 0x0000000000000000 intr_info 0x00000000 error_code 0x00000000
>> kvm_cr: cr_read 0 = 0x60000010
>> kvm_entry: vcpu 0, rip 0xfff3
>>
>> As we can see from the kvm trace, the first instruction here is the Cr0 read
>> and it was successfully intercepted and rip moved to next instruction.
>>
>> Can you please provide me KVM trace for your failure case ? Also, provide me
>> the output of "lscpu" and "dmesg" from the host.
> The OVMF image you tested is built with GCC tool chain, right?
Yes, we have been using the GCC tool chain only.
> I usually do the development in windows and build the OVMF image with VS2019.
> If the new feature works, then I cherry-pick the patch-sets to code base in ubuntu
> 18.04 and build/test the new feature.
>
> The weird thing is that, with VS2019, even the OVMF image is built from edk2-master,
> such image doesn't work on AMD SEV server either. But if the image is built by Ubuntu 18.04,
> it does work on AMD SEV server.
This seems very strange that we are failing to execute the hand written
assembly code. I am wondering if somehow the VS compiler is generating a
wrong byte code and thus causing a trap on KVM that requires emulation.
Since the guest memory is encrypted, so KVM emulation code will not be
able to decode the instruction bytes and thus leading in repetitive
nested fault. Only way I could verify my theory is if I can get a KVM
trace or an OVMF binary. If you have have KVM trace or OVMF_CODE.fd
handy then please share.
> I applied my TDX patch-sets to the code base on my Ubuntu 18.04, and build the image.
> This image does work in both AMD SEV server and Intel TDX server.
>
> Thanks!
> Min
next prev parent reply other threads:[~2021-09-18 11:30 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-09-14 8:50 [PATCH V6 0/1] Add Intel TDX support in OvmfPkg/ResetVector Min Xu
2021-09-14 8:50 ` [PATCH V6 1/1] OvmfPkg: Enable TDX in ResetVector Min Xu
2021-09-14 11:24 ` Brijesh Singh
2021-09-14 19:00 ` [edk2-devel] " vannapurve
2021-09-14 19:52 ` Brijesh Singh
2021-09-15 2:34 ` Min Xu
2021-09-17 12:55 ` Min Xu
2021-09-17 15:52 ` Brijesh Singh
2021-09-18 5:16 ` Min Xu
2021-09-18 11:30 ` Brijesh Singh [this message]
2021-09-18 12:15 ` James Bottomley
2021-09-19 3:14 ` Min Xu
2021-09-20 15:49 ` Brijesh Singh
2021-09-15 2:13 ` Min Xu
2021-09-16 7:54 ` Gerd Hoffmann
2021-09-20 9:51 ` Min Xu
2021-09-21 5:16 ` Gerd Hoffmann
2021-09-21 9:04 ` Min Xu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=3069705d-bf76-bcb7-e94f-dec9d19b47d6@amd.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox