[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230213234836.3683-1-kirill.shutemov@linux.intel.com>
Date: Tue, 14 Feb 2023 02:48:34 +0300
From: "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>
To: Dave Hansen <dave.hansen@...el.com>, Borislav Petkov <bp@...en8.de>
Cc: Kuppuswamy Sathyanarayanan
<sathyanarayanan.kuppuswamy@...ux.intel.com>,
Thomas Gleixner <tglx@...utronix.de>,
Isaku Yamahata <isaku.yamahata@...el.com>, x86@...nel.org,
linux-coco@...ts.linux.dev, kexec@...ts.infradead.org,
linux-kernel@...r.kernel.org,
"Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>
Subject: [PATCH 0/2] Kexec enabling in TDX guest
The patch brings basic enabling of kexec in TDX guests.
By "basic enabling" I mean, kexec in the guests with a single CPU.
TDX guests use ACPI MADT MPWK to bring up secondary CPUs. The mechanism
doesn't allow to put a CPU back offline if it has woken up.
We are looking into this, but it might take time.
Kirill A. Shutemov (2):
x86/kexec: Preserve CR4.MCE during kexec
x86/tdx: Convert shared memory back to private on kexec
arch/x86/coco/tdx/Makefile | 1 +
arch/x86/coco/tdx/kexec.c | 82 ++++++++++++++++++++++++++++
arch/x86/include/asm/tdx.h | 4 ++
arch/x86/kernel/machine_kexec_64.c | 2 +
arch/x86/kernel/relocate_kernel_64.S | 6 +-
5 files changed, 94 insertions(+), 1 deletion(-)
create mode 100644 arch/x86/coco/tdx/kexec.c
--
2.39.1
Powered by blists - more mailing lists