From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) by mx.groups.io with SMTP id smtpd.web09.26747.1626696860919209070 for ; Mon, 19 Jul 2021 05:14:21 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@ibm.com header.s=pp1 header.b=kRFNW7mh; spf=pass (domain: linux.ibm.com, ip: 148.163.156.1, mailfrom: dovmurik@linux.ibm.com) Received: from pps.filterd (m0098399.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 16JC30n0004892; Mon, 19 Jul 2021 08:14:20 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=subject : to : references : cc : from : message-id : date : in-reply-to : content-type : content-transfer-encoding : mime-version; s=pp1; bh=EtWd4xDBqEyUk6eCN0dn1gQRybxM1Z04hUATxRiJ1o4=; b=kRFNW7mhFTdzZ4eEbkGXv+Da1htrx9ooaM7FddK6Wiu0xFDE+gX5Yk4XPkZu+rKxcSa+ nEWSYIJeDhSKej7o0wF5EbCBZRF6U5jMwkNWpN2beo5+kh2rMfS/GPF9aeWsr2UrvI0u CKOK8697CehhaZHbo48mqsy+tQb8LPiTE/pVU28xTV1+OmGl1uWNrWhgrBHmwFgfiUyE 8KBm5HtBEWyz58oqqvXCxPTRp2ZC+oek+n9xW4bE3DLqlnLyuiO1FDx++Ybsk3rKBrHK e+UT30rQ3KL/1lqnk4/1EcT+gRTwA2z3mc9i9DHCn093uuAob5PvN3PvYb04OZzflkdd BA== Received: from ppma04dal.us.ibm.com (7a.29.35a9.ip4.static.sl-reverse.com [169.53.41.122]) by mx0a-001b2d01.pphosted.com with ESMTP id 39w8gs9g3s-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 19 Jul 2021 08:14:19 -0400 Received: from pps.filterd (ppma04dal.us.ibm.com [127.0.0.1]) by ppma04dal.us.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 16JCDCGs005961; Mon, 19 Jul 2021 12:14:19 GMT Received: from b01cxnp22036.gho.pok.ibm.com (b01cxnp22036.gho.pok.ibm.com [9.57.198.26]) by ppma04dal.us.ibm.com with ESMTP id 39upuarjh7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 19 Jul 2021 12:14:19 +0000 Received: from b01ledav002.gho.pok.ibm.com (b01ledav002.gho.pok.ibm.com [9.57.199.107]) by b01cxnp22036.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 16JCEIcL10879924 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 19 Jul 2021 12:14:18 GMT Received: from b01ledav002.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2E9CA124074; Mon, 19 Jul 2021 12:14:18 +0000 (GMT) Received: from b01ledav002.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 6F029124055; Mon, 19 Jul 2021 12:14:17 +0000 (GMT) Received: from [9.65.195.237] (unknown [9.65.195.237]) by b01ledav002.gho.pok.ibm.com (Postfix) with ESMTP; Mon, 19 Jul 2021 12:14:17 +0000 (GMT) Subject: Re: [edk2-devel] [PATCH v2 03/11] OvmfPkg: PlatformBootManagerLibGrub: Allow executing kernel via fw_cfg To: Christoph Willing , devel@edk2.groups.io References: <20210706085501.1260662-4-dovmurik@linux.ibm.com> <10114.1626669983386900125@groups.io> Cc: Dov Murik From: "Dov Murik" Message-ID: Date: Mon, 19 Jul 2021 15:14:16 +0300 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 In-Reply-To: <10114.1626669983386900125@groups.io> X-TM-AS-GCONF: 00 X-Proofpoint-GUID: vY--xGx7dqUTH8roBldIbVNsbccqsMaz X-Proofpoint-ORIG-GUID: vY--xGx7dqUTH8roBldIbVNsbccqsMaz X-Proofpoint-UnRewURL: 0 URL was un-rewritten MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391,18.0.790 definitions=2021-07-19_05:2021-07-16,2021-07-19 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 adultscore=0 malwarescore=0 suspectscore=0 bulkscore=0 clxscore=1011 mlxlogscore=999 spamscore=0 phishscore=0 impostorscore=0 priorityscore=1501 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104190000 definitions=main-2107190069 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Chris, On 19/07/2021 7:46, Christoph Willing wrote: > I have been using Qemu with -kernel,-initrd,-append options without OVMF for some time in my workflow. When booting with OVMF, I have found that the most recent tag in the edk2 public git repo that supports those options is vUDK2018. Therefore I'm extremely interested in this series of patches, hoping they'll restore the missing functionality, and would like to test them locally. Is there any location from where I could obtain the patches themselves or, better still, access to a repo somewhere that already has them applied? > Are you trying to boot a VM with AMD SEV? This patch series is all about enabling these switches for SEV (memory-encrypted VMs). For "normal" VMs there should be no change. If you indeed use SEV guests, this patch series is available in https://github.com/confidential-containers-demo/edk2/tree/sev-hashes-v2 but also requires the corresponding QEMU patches in https://lore.kernel.org/qemu-devel/20210624102040.2015280-1-dovmurik@linux.ibm.com/ which are not yet upstream. -Dov