Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-21 Thread Laszlo Ersek
On 10/21/15 17:11, Paolo Bonzini wrote: > > > On 21/10/2015 17:04, Laszlo Ersek wrote: >> Now, on TCG, reading the APIC ID register (for device "apic") happens in: >> >> apic_mem_readl() [hw/intc/apic.c] >> val = s->id << 24 >> >> Whereas on KVM, the same occurs in: >> >> kvm_apic_mem_read()

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-21 Thread Laszlo Ersek
On 10/21/15 14:10, Laszlo Ersek wrote: > On 10/15/15 00:25, Laszlo Ersek wrote: > >> Test environment and results: >> >> Host kernel: >> - latest RHEL-7 development kernel (3.10.0-323.el7), with Paolo's >> following patches backported by yours truly: >> - KVM: x86: clean up

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-21 Thread Laszlo Ersek
On 10/21/15 12:27, Paolo Bonzini wrote: > > > On 21/10/2015 12:22, Laszlo Ersek wrote: >> On 10/21/15 11:51, Paolo Bonzini wrote: >>> >>> >>> On 20/10/2015 12:08, Laszlo Ersek wrote: >> >> 64 KVM>=1"KVM: entry failed, hardware error 0x8021" >>

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-21 Thread Laszlo Ersek
On 10/21/15 17:04, Laszlo Ersek wrote: > On 10/21/15 14:10, Laszlo Ersek wrote: >> On 10/15/15 00:25, Laszlo Ersek wrote: >> >>> Test environment and results: >>> >>> Host kernel: >>> - latest RHEL-7 development kernel (3.10.0-323.el7), with Paolo's >>> following patches backported by yours

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-21 Thread Paolo Bonzini
On 21/10/2015 12:22, Laszlo Ersek wrote: > On 10/21/15 11:51, Paolo Bonzini wrote: >> >> >> On 20/10/2015 12:08, Laszlo Ersek wrote: > > 64 KVM>=1"KVM: entry failed, hardware error 0x8021" > while guest in SMBASE relocation >>> Tracing KVM

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-20 Thread Laszlo Ersek
On 10/15/15 00:25, Laszlo Ersek wrote: > Test environment and results: > > Host kernel: > - latest RHEL-7 development kernel (3.10.0-323.el7), with Paolo's > following patches backported by yours truly: > - KVM: x86: clean up kvm_arch_vcpu_runnable > - KVM: x86: fix SMI to halted VCPU > >

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-20 Thread Laszlo Ersek
On 10/15/15 00:25, Laszlo Ersek wrote: > Test environment and results: > > Host kernel: > - latest RHEL-7 development kernel (3.10.0-323.el7), with Paolo's > following patches backported by yours truly: > - KVM: x86: clean up kvm_arch_vcpu_runnable > - KVM: x86: fix SMI to halted VCPU > >

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-20 Thread Laszlo Ersek
On 10/20/15 10:52, Laszlo Ersek wrote: > On 10/15/15 00:25, Laszlo Ersek wrote: > >> Test environment and results: >> >> Host kernel: >> - latest RHEL-7 development kernel (3.10.0-323.el7), with Paolo's >> following patches backported by yours truly: >> - KVM: x86: clean up

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-20 Thread Laszlo Ersek
On 10/20/15 18:27, Laszlo Ersek wrote: > On 10/20/15 18:24, Laszlo Ersek wrote: >> On 10/20/15 16:37, Laszlo Ersek wrote: >> >>> The variable access fails *iff* the access is made by a VCPU that is >>> *not* VCPU#0. >>> >>> I added a bunch of debug messages to the following functions: >>> >>> -

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-20 Thread Laszlo Ersek
On 10/20/15 16:37, Laszlo Ersek wrote: > The variable access fails *iff* the access is made by a VCPU that is > *not* VCPU#0. > > I added a bunch of debug messages to the following functions: > > - InitCommunicateBuffer(), SendCommunicateBuffer() >

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-20 Thread Laszlo Ersek
On 10/20/15 18:24, Laszlo Ersek wrote: > On 10/20/15 16:37, Laszlo Ersek wrote: > >> The variable access fails *iff* the access is made by a VCPU that is >> *not* VCPU#0. >> >> I added a bunch of debug messages to the following functions: >> >> - InitCommunicateBuffer(), SendCommunicateBuffer()

Re: [edk2] [PATCH v3 00/52] OvmfPkg: support SMM for better security (steps towards MP and X64)

2015-10-15 Thread Laszlo Ersek
On 10/15/15 05:30, Kinney, Michael D wrote: > Laszlo, > > I have 32 VCPUs booting to UEFI Shell using Windows build of 32-bit QEMU. Great! > If more than 32, then we run out of SMRAM. If you'd like to experiment with more, please locate the "gUefiOvmfPkgTokenSpaceGuid.PcdQ35TsegMbytes" PCD in