From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from bedivere.hansenpartnership.com (bedivere.hansenpartnership.com [96.44.175.130]) by mx.groups.io with SMTP id smtpd.web11.2856.1607989888404446138 for ; Mon, 14 Dec 2020 15:51:28 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b=TQtvkk0K; spf=pass (domain: hansenpartnership.com, ip: 96.44.175.130, mailfrom: james.bottomley@hansenpartnership.com) Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id E7BBE12808D0; Mon, 14 Dec 2020 15:51:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1607989887; bh=kkxyctkRB6t9kiX3yfgGzJlRqOVbv2Z0y66aVzWs1Cw=; h=Message-ID:Subject:From:To:Date:From; b=TQtvkk0KLG4pu86hqRCQoYWKaHE4gKcyhRsJTJqaT7+qRv6OR7oOXukVWTRX1vA43 FY/U1oCRiN5AaqhR+uZDcRTinG+BJOli+0tTGWerf7rXKjBmKiF4aMMRY6tG88D7OB G8He4N2zKSjXV64B8TgxfvggV1xhbU61Frescavs= Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ob1mKBQviNy5; Mon, 14 Dec 2020 15:51:27 -0800 (PST) Received: from jarvis.int.hansenpartnership.com (unknown [IPv6:2601:600:8280:66d1::527]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 745C5128087C; Mon, 14 Dec 2020 15:51:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1607989887; bh=kkxyctkRB6t9kiX3yfgGzJlRqOVbv2Z0y66aVzWs1Cw=; h=Message-ID:Subject:From:To:Date:From; b=TQtvkk0KLG4pu86hqRCQoYWKaHE4gKcyhRsJTJqaT7+qRv6OR7oOXukVWTRX1vA43 FY/U1oCRiN5AaqhR+uZDcRTinG+BJOli+0tTGWerf7rXKjBmKiF4aMMRY6tG88D7OB G8He4N2zKSjXV64B8TgxfvggV1xhbU61Frescavs= Message-ID: <58408ffaedfd7f7a1c433ff539b69acb625890dc.camel@HansenPartnership.com> Subject: BUG: OvmfPkgX64 is broken with cee5b0441af3 UefiCpuPkg/CpuDxe: Fix boot error From: "James Bottomley" To: devel@edk2.groups.io Cc: Guo Dong , "Dong, Eric" , "Ni, Ray" , "Kumar, Rahul1" , LaszloErsek Date: Mon, 14 Dec 2020 15:51:26 -0800 User-Agent: Evolution 3.34.4 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit I found this trying to test out the upstream SEV secret injection on an AMD rome system. However, I rebuilt the OvmfPkgX64 (still on a rome system) just to check. I get a boot loop here if I leave this commit unreverted: InstallProtocolInterface: BC62157E-3E33-4FEC-9920-2D3B36D750DF 7F1AD918 ProtectUefiImageCommon - 0x7F1AD2C0 - 0x000000007F068000 - 0x000000000000FCC0 Paging: added 512 pages to page table pool CurrentPagingContext: MachineType - 0x8664 PageTableBase - 0x7F801000 Attributes - 0xC0000006 SecCoreStartupWithStack(0xFFFCC000, 0x820000) If I revert this commit, it will boot up normally. The memory specification for qemu-kvm I'm using is -m 4096M,slots=5,maxmem=30G but reducing it to under 4GB doesn't help James