From: Andrew Jones <drjones@redhat.com>
To: zxwang42@gmail.com
Cc: kvm@vger.kernel.org, pbonzini@redhat.com, marcorr@google.com,
baekhw@google.com, tmroeder@google.com, erdemaktas@google.com,
rientjes@google.com, seanjc@google.com, brijesh.singh@amd.com,
Thomas.Lendacky@amd.com, varad.gautam@suse.com, jroedel@suse.de,
bp@suse.de
Subject: Re: [kvm-unit-tests PATCH v2 00/17] x86_64 UEFI and AMD SEV/SEV-ES support
Date: Mon, 4 Oct 2021 15:27:20 +0200 [thread overview]
Message-ID: <20211004132720.i77d2knwl7gxi3mx@gator> (raw)
In-Reply-To: <20210827031222.2778522-1-zixuanwang@google.com>
On Fri, Aug 27, 2021 at 03:12:05AM +0000, Zixuan Wang wrote:
> Hello,
>
> This patch series updates the x86_64 KVM-Unit-Tests to run under UEFI
> and culminates in enabling AMD SEV/SEV-ES. The patches are organized as
> three parts.
>
> The first part (patches 1-2) copies code from Varad's patch set [1]
> that builds EFI stubs without depending on GNU-EFI. Part 2 and 3 are
> built on top of this part.
>
> The second part (patches 3-10) enables the x86_64 test cases to run
> under UEFI. In particular, these patches allow the x86_64 test cases to
> be built as EFI executables and take full control of the guest VM. The
> efi_main() function sets up the KVM-Unit-Tests framework to run under
> UEFI and then launches the test cases' main() function. To date, we
> have 38/43 test cases running with UEFI using this approach.
>
> The third part of the series (patches 11-17) focuses on SEV. In
> particular, these patches introduce SEV/SEV-ES set up code into the EFI
> set up process, including checking if SEV is supported, setting c-bits
> for page table entries, and (notably) reusing the UEFI #VC handler so
> that the set up process does not need to re-implement it (a test case
> can always implement a new #VC handler and load it after set up is
> finished). Using this approach, we are able to launch the x86_64 test
> cases under SEV-ES and exercise KVM's VMGEXIT handler.
>
> Note, a previous feedback [3] indicated that long-term we'd like to
> instrument KVM-Unit-Tests with it's own #VC handler. However, we still
> believe that the current approach is good as an intermediate solution,
> because it unlocks a lot of testing and we do not expect that testing
> to be inherently tied to the UEFI's #VC handler. Rather, test cases
> should be tied to the underlying GHCB spec implemented by an
> arbitrary #VC handler.
>
> See the Part 1 to Part 3 summaries, below, for a high-level breakdown
> of how the patches are organized.
>
> Part 1 Summary:
> Commits 1-2 copy code from Varad's patch set [1] that implements
> EFI-related helper functions to replace the GNU-EFI library.
>
> Part 2 Summary:
> Commits 3-4 introduce support to build test cases with EFI support.
>
> Commits 5-9 set up KVM-Unit-Tests to run under UEFI. In doing so, these
> patches incrementally enable most existing x86_64 test cases to run
> under UEFI.
>
> Commit 10 fixes several test cases that fail to compile with EFI due
> to UEFI's position independent code (PIC) requirement.
>
> Part 3 Summary:
> Commits 11-12 introduce support for SEV by adding code to set the SEV
> c-bit in page table entries.
>
> Commits 13-16 introduce support for SEV-ES by reusing the UEFI #VC
> handler in KVM-Unit-Tests. They also fix GDT and IDT issues that occur
> when reusing UEFI functions in KVM-Unit-Tests.
>
> Commit 17 adds additional test cases for SEV-ES.
>
> Changes in V2:
> 1.Merge Varad's patch set [1] as the foundation of this V2 patch set.
> 2.Remove AMD SEV/SEV-ES config flags and macros (patches 11-17)
> 3.Drop one commit 'x86 UEFI: Move setjmp.h out of desc.h' because we do
> not link GNU-EFI library.
>
> Notes on authorships and attributions:
> The first two commits are from Varad's patch set [1], so they are
> tagged as 'From:' and 'Signed-off-by:' Varad. Commits 3-7 are from our
> V1 patch set [2], and since Varad implemented similar code [1], these
> commits are tagged as 'Co-developed-by:' and 'Signed-off-by:' Varad.
>
> Notes on patch sets merging strategy:
> We understand that the current merging strategy (reorganizing and
> squeezing Varad's patches into two) reduces Varad's authorships, and we
> hope the additional attribution tags make up for it. We see another
> approach which is to build our patch set on top of Varad's original
> patch set, but this creates some noise in the final patch set, e.g.,
> x86/cstart64.S is modified in Varad's part and later reverted in our
> part as we implement start up code in C. For the sake of the clarity of
> the code history, we believe the current approach is the best effort so
> far, and we are open to all kinds of opinions.
>
> [1] https://lore.kernel.org/kvm/20210819113400.26516-1-varad.gautam@suse.com/
> [2] https://lore.kernel.org/kvm/20210818000905.1111226-1-zixuanwang@google.com/
> [3] https://lore.kernel.org/kvm/YSA%2FsYhGgMU72tn+@google.com/
>
> Regards,
> Zixuan Wang
>
> Varad Gautam (2):
> x86 UEFI: Copy code from Linux
> x86 UEFI: Implement UEFI function calls
>
> Zixuan Wang (15):
> x86 UEFI: Copy code from GNU-EFI
> x86 UEFI: Boot from UEFI
> x86 UEFI: Load IDT after UEFI boot up
> x86 UEFI: Load GDT and TSS after UEFI boot up
> x86 UEFI: Set up memory allocator
> x86 UEFI: Set up RSDP after UEFI boot up
> x86 UEFI: Set up page tables
> x86 UEFI: Convert x86 test cases to PIC
> x86 AMD SEV: Initial support
> x86 AMD SEV: Page table with c-bit
> x86 AMD SEV-ES: Check SEV-ES status
> x86 AMD SEV-ES: Load GDT with UEFI segments
> x86 AMD SEV-ES: Copy UEFI #VC IDT entry
> x86 AMD SEV-ES: Set up GHCB page
> x86 AMD SEV-ES: Add test cases
>
> .gitignore | 3 +
> Makefile | 29 +-
> README.md | 6 +
> configure | 6 +
> lib/efi.c | 117 ++++++++
> lib/efi.h | 18 ++
> lib/linux/uefi.h | 539 +++++++++++++++++++++++++++++++++++++
> lib/x86/acpi.c | 38 ++-
> lib/x86/acpi.h | 11 +
> lib/x86/amd_sev.c | 214 +++++++++++++++
> lib/x86/amd_sev.h | 64 +++++
> lib/x86/asm/page.h | 28 +-
> lib/x86/asm/setup.h | 31 +++
> lib/x86/setup.c | 246 +++++++++++++++++
> lib/x86/usermode.c | 3 +-
> lib/x86/vm.c | 18 +-
> x86/Makefile.common | 68 +++--
> x86/Makefile.i386 | 5 +-
> x86/Makefile.x86_64 | 58 ++--
> x86/access.c | 9 +-
> x86/amd_sev.c | 94 +++++++
> x86/cet.c | 8 +-
> x86/efi/README.md | 63 +++++
> x86/efi/crt0-efi-x86_64.S | 79 ++++++
> x86/efi/efistart64.S | 143 ++++++++++
> x86/efi/elf_x86_64_efi.lds | 81 ++++++
> x86/efi/reloc_x86_64.c | 97 +++++++
> x86/efi/run | 63 +++++
> x86/emulator.c | 5 +-
> x86/eventinj.c | 6 +-
> x86/run | 16 +-
> x86/smap.c | 8 +-
> x86/umip.c | 10 +-
> 33 files changed, 2110 insertions(+), 74 deletions(-)
> create mode 100644 lib/efi.c
> create mode 100644 lib/efi.h
> create mode 100644 lib/linux/uefi.h
> create mode 100644 lib/x86/amd_sev.c
> create mode 100644 lib/x86/amd_sev.h
> create mode 100644 lib/x86/asm/setup.h
> create mode 100644 x86/amd_sev.c
> create mode 100644 x86/efi/README.md
> create mode 100644 x86/efi/crt0-efi-x86_64.S
> create mode 100644 x86/efi/efistart64.S
> create mode 100644 x86/efi/elf_x86_64_efi.lds
> create mode 100644 x86/efi/reloc_x86_64.c
> create mode 100755 x86/efi/run
>
> --
> 2.33.0.259.gc128427fd7-goog
>
Hi Zixuan,
If you still intend to work on this series, please send a new posting from
your personal mail address to avoid mail bounces on reviews.
Thanks,
drew
next prev parent reply other threads:[~2021-10-04 13:29 UTC|newest]
Thread overview: 47+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-08-27 3:12 [kvm-unit-tests PATCH v2 00/17] x86_64 UEFI and AMD SEV/SEV-ES support Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 01/17] x86 UEFI: Copy code from Linux Zixuan Wang
2021-09-20 14:33 ` Paolo Bonzini
2021-09-21 3:58 ` Zixuan Wang
2021-09-21 6:37 ` Varad Gautam
2021-09-21 16:33 ` Andrew Jones
2021-09-22 20:10 ` Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 02/17] x86 UEFI: Implement UEFI function calls Zixuan Wang
2021-09-21 16:43 ` Andrew Jones
2021-09-22 20:17 ` Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 03/17] x86 UEFI: Copy code from GNU-EFI Zixuan Wang
2021-10-04 12:44 ` Andrew Jones
2021-10-04 22:09 ` Zixuan Wang
2021-10-05 5:58 ` Andrew Jones
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 04/17] x86 UEFI: Boot from UEFI Zixuan Wang
2021-10-04 12:55 ` Andrew Jones
2021-10-04 21:30 ` Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 05/17] x86 UEFI: Load IDT after UEFI boot up Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 06/17] x86 UEFI: Load GDT and TSS " Zixuan Wang
2021-09-20 15:40 ` Paolo Bonzini
2021-09-21 4:15 ` Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 07/17] x86 UEFI: Set up memory allocator Zixuan Wang
2021-10-04 13:06 ` Andrew Jones
2021-10-04 21:43 ` Zixuan Wang
2021-10-05 6:05 ` Andrew Jones
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 08/17] x86 UEFI: Set up RSDP after UEFI boot up Zixuan Wang
2021-10-04 13:21 ` Andrew Jones
2021-10-04 21:58 ` Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 09/17] x86 UEFI: Set up page tables Zixuan Wang
2021-09-20 15:43 ` Paolo Bonzini
2021-09-21 4:31 ` Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 10/17] x86 UEFI: Convert x86 test cases to PIC Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 11/17] x86 AMD SEV: Initial support Zixuan Wang
2021-08-27 14:51 ` Tom Lendacky
2021-08-31 19:36 ` Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 12/17] x86 AMD SEV: Page table with c-bit Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 13/17] x86 AMD SEV-ES: Check SEV-ES status Zixuan Wang
2021-08-27 14:55 ` Tom Lendacky
2021-08-31 19:38 ` Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 14/17] x86 AMD SEV-ES: Load GDT with UEFI segments Zixuan Wang
2021-09-20 16:00 ` Paolo Bonzini
2021-09-21 4:41 ` Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 15/17] x86 AMD SEV-ES: Copy UEFI #VC IDT entry Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 16/17] x86 AMD SEV-ES: Set up GHCB page Zixuan Wang
2021-08-27 3:12 ` [kvm-unit-tests PATCH v2 17/17] x86 AMD SEV-ES: Add test cases Zixuan Wang
2021-10-04 13:27 ` Andrew Jones [this message]
2021-10-04 20:54 ` [kvm-unit-tests PATCH v2 00/17] x86_64 UEFI and AMD SEV/SEV-ES support Zixuan Wang
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20211004132720.i77d2knwl7gxi3mx@gator \
--to=drjones@redhat.com \
--cc=Thomas.Lendacky@amd.com \
--cc=baekhw@google.com \
--cc=bp@suse.de \
--cc=brijesh.singh@amd.com \
--cc=erdemaktas@google.com \
--cc=jroedel@suse.de \
--cc=kvm@vger.kernel.org \
--cc=marcorr@google.com \
--cc=pbonzini@redhat.com \
--cc=rientjes@google.com \
--cc=seanjc@google.com \
--cc=tmroeder@google.com \
--cc=varad.gautam@suse.com \
--cc=zxwang42@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).