[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <cover.1710744412.git.ashish.kalra@amd.com>
Date: Mon, 18 Mar 2024 07:02:13 +0000
From: Ashish Kalra <Ashish.Kalra@....com>
To: <tglx@...utronix.de>, <mingo@...hat.com>, <dave.hansen@...ux.intel.com>
CC: <rafael@...nel.org>, <peterz@...radead.org>, <adrian.hunter@...el.com>,
<sathyanarayanan.kuppuswamy@...ux.intel.com>, <elena.reshetova@...el.com>,
<jun.nakajima@...el.com>, <rick.p.edgecombe@...el.com>,
<thomas.lendacky@....com>, <seanjc@...gle.com>, <michael.roth@....com>,
<kai.huang@...el.com>, <bhe@...hat.com>, <kexec@...ts.infradead.org>,
<linux-coco@...ts.linux.dev>, <linux-kernel@...r.kernel.org>,
<kirill.shutemov@...ux.intel.com>, <bdas@...hat.com>, <vkuznets@...hat.com>,
<dionnaglaze@...gle.com>, <anisinha@...hat.com>, <jroedel@...e.de>
Subject: [PATCH v2 0/3] x86/snp: Add kexec support
From: Ashish Kalra <ashish.kalra@....com>
The patchset adds bits and pieces to get kexec (and crashkernel) work on
SNP guest.
v2:
- address zeroing of unaccepted memory table mappings at all page table levels
adding phys_pte_init(), phys_pud_init() and phys_p4d_init().
- include skip efi_arch_mem_reserve() in case of kexec as part of this
patch set.
- rename last_address_shd_kexec to a more appropriate
kexec_last_address_to_make_private.
- remove duplicate code shared with TDX and use common interfaces
defined for SNP and TDX for kexec/kdump.
- remove set_pte_enc() dependency on pg_level_to_pfn() and make the
function simpler.
- rename unshare_pte() to make_pte_private().
- clarify and make the comment for using kexec_last_address_to_make_private
more understandable.
- general cleanup.
Ashish Kalra (3):
efi/x86: skip efi_arch_mem_reserve() in case of kexec.
x86/mm: Do not zap page table entries mapping unaccepted memory table
during kdump.
x86/snp: Convert shared memory back to private on kexec
arch/x86/include/asm/probe_roms.h | 1 +
arch/x86/include/asm/sev.h | 4 +
arch/x86/kernel/probe_roms.c | 16 +++
arch/x86/kernel/sev.c | 169 ++++++++++++++++++++++++++++++
arch/x86/mm/init_64.c | 16 ++-
arch/x86/mm/mem_encrypt_amd.c | 3 +
arch/x86/platform/efi/quirks.c | 10 ++
7 files changed, 215 insertions(+), 4 deletions(-)
--
2.34.1
Powered by blists - more mailing lists