|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Laszlo Ersek <lersek@...> wrote:
it shouldn't matter where from management SMI comes if OS won't be able
to actually trigger SMI with un-trusted content at SMBASE on hotplugged (parked)
Laszlo Ersek <lersek@...> wrote:
it shouldn't matter where from management SMI comes if OS won't be able
to actually trigger SMI with un-trusted content at SMBASE on hotplugged (parked)
|
By
Igor Mammedov <imammedo@...>
·
#55
·
|
|
Re: CPU hotplug using SMM with QEMU+OVMF
The BSP starts running from 0xFFFFFFF0. APs do not start running at all
and just sit waiting for an INIT-SIPI-SIPI sequence. Please see my
proposal in the reply to Laszlo.
Paolo
The BSP starts running from 0xFFFFFFF0. APs do not start running at all
and just sit waiting for an INIT-SIPI-SIPI sequence. Please see my
proposal in the reply to Laszlo.
Paolo
|
By
Paolo Bonzini <pbonzini@...>
·
#54
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Correct. The 0x30000...0x3ffff area is the only problematic one;
Igor's idea (or a variant, for example optionally remapping
0xa0000..0xaffff SMRAM to 0x30000) is becoming more and more
Correct. The 0x30000...0x3ffff area is the only problematic one;
Igor's idea (or a variant, for example optionally remapping
0xa0000..0xaffff SMRAM to 0x30000) is becoming more and more
|
By
Paolo Bonzini <pbonzini@...>
·
#53
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Laszlo Ersek <lersek@...> wrote:
It depends. For starters, the vfio mapping API does not allow
unmapping arbitrary sub-ranges of previous mappings. So the hole you
want to punch would need
Laszlo Ersek <lersek@...> wrote:
It depends. For starters, the vfio mapping API does not allow
unmapping arbitrary sub-ranges of previous mappings. So the hole you
want to punch would need
|
By
Alex Williamson <alex.williamson@...>
·
#52
·
|
|
[POC Seabios PATCH] seabios: use isolated SMM address space for relocation
for purpose of demo SMRAM (at 0x30000) is aliased at a0000 in system address space
for easy initialization of SMI entry point.
Here is resulting debug output showing that RAM at 0x30000 is not
for purpose of demo SMRAM (at 0x30000) is aliased at a0000 in system address space
for easy initialization of SMI entry point.
Here is resulting debug output showing that RAM at 0x30000 is not
|
By
Igor Mammedov <imammedo@...>
·
#51
·
|
|
[POC QEMU PATCH 0/2] CPU hotplug: use dedicated SMRAM at 0x30000 in SMM address space
It's just a quick hack together with Seabios to show
that normal RAM at 0x30000 is not affected by SMM relocation
and dedicated SMRAM could be used for relocation without need to
care about untrusted
It's just a quick hack together with Seabios to show
that normal RAM at 0x30000 is not affected by SMM relocation
and dedicated SMRAM could be used for relocation without need to
care about untrusted
|
By
Igor Mammedov <imammedo@...>
·
#50
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Perhaps there is a way to avoid the 3000:8000 startup
vector.
If a CPU is added after a cold reset, it is already in a
different state because one of the active CPUs needs to
release it by
Perhaps there is a way to avoid the 3000:8000 startup
vector.
If a CPU is added after a cold reset, it is already in a
different state because one of the active CPUs needs to
release it by
|
By
Michael D Kinney
·
#49
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Alex, thank you for the help! Please let us know if we should remove you
from the CC list, in order not to clutter your inbox. (I've kept your
address for now, for saying thanks. Feel free to stop
Alex, thank you for the help! Please let us know if we should remove you
from the CC list, in order not to clutter your inbox. (I've kept your
address for now, for saying thanks. Feel free to stop
|
By
Laszlo Ersek
·
#48
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
in real world, we deprecate AB-seg usage because they are vulnerable to smm cache poison attack.
I assume cache poison is out of scope in the virtual world, or there is a way to prevent ABseg cache
in real world, we deprecate AB-seg usage because they are vulnerable to smm cache poison attack.
I assume cache poison is out of scope in the virtual world, or there is a way to prevent ABseg cache
|
By
Yao, Jiewen
·
#47
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
By
Yao, Jiewen
·
#46
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
+Alex (direct question at the bottom)
The magic is 07a itself, IIUC. The CPU hotplug controller would be
accessible only in SMM. And until 07a happens, the new CPU ignores
INIT/SIPI/SIPI even if
+Alex (direct question at the bottom)
The magic is 07a itself, IIUC. The CPU hotplug controller would be
accessible only in SMM. And until 07a happens, the new CPU ignores
INIT/SIPI/SIPI even if
|
By
Laszlo Ersek
·
#45
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
(Could Intel open source code for this?)
PCI DMA attack might be relevant (but yes, I see you've mentioned that
too, down-thread)
I wish we could simply wake the new CPU -- after step 07a -- with
(Could Intel open source code for this?)
PCI DMA attack might be relevant (but yes, I see you've mentioned that
too, down-thread)
I wish we could simply wake the new CPU -- after step 07a -- with
|
By
Laszlo Ersek
·
#44
·
|
|
Soft Feature Freeze starts now for edk2-stable201908
Hi, all
Now, we enter into Soft Feature Freeze phase. In this phase, the feature under review will not be allowed to be pushed. The patch review can continue without break in edk2 community.
If
Hi, all
Now, we enter into Soft Feature Freeze phase. In this phase, the feature under review will not be allowed to be pushed. The patch review can continue without break in edk2 community.
If
|
By
Liming Gao
·
#43
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
below
By
Yao, Jiewen
·
#42
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
Comment below:
By
Yao, Jiewen
·
#41
·
|
|
Re: [edk2-devel] CPU hotplug using SMM with QEMU+OVMF
I was going through the steps Jiewen and Yingwen recommended.
In step (02), the new CPU is expected to set up RAM access. In step
(03), the new CPU, executing code from flash, is expected to "send
I was going through the steps Jiewen and Yingwen recommended.
In step (02), the new CPU is expected to set up RAM access. In step
(03), the new CPU, executing code from flash, is expected to "send
|
By
Laszlo Ersek
·
#40
·
|
|
Re: CPU hotplug using SMM with QEMU+OVMF
Hi Paolo
I am not sure what do you mean - "You do not need a reset vector ...".
If so, where is the first instruction of the new CPU in the virtualization environment?
Please help me understand that
Hi Paolo
I am not sure what do you mean - "You do not need a reset vector ...".
If so, where is the first instruction of the new CPU in the virtualization environment?
Please help me understand that
|
By
Yao, Jiewen
·
#39
·
|
|
Re: [edk2-devel] [RFC] BZ 1837 Enable Windows Firmware Update Driver Tool in Edk2/BaseTools for 201908 stable tag
Hi Leif,
By
Eric Jin <eric.jin@...>
·
#38
·
|
|
Re: CPU hotplug using SMM with QEMU+OVMF
Yes, this would be a new operation mode for QEMU, that only applies to
hot-plugged CPUs. In this mode the AP doesn't reply to INIT or SMI, in
fact it doesn't reply to anything at all.
You do not
Yes, this would be a new operation mode for QEMU, that only applies to
hot-plugged CPUs. In this mode the AP doesn't reply to INIT or SMI, in
fact it doesn't reply to anything at all.
You do not
|
By
Paolo Bonzini <pbonzini@...>
·
#37
·
|
|
Re: CPU hotplug using SMM with QEMU+OVMF
My comments below.
By
Yao, Jiewen
·
#36
·
|