Kexec Archive on lore.kernel.org
 help / color / mirror / Atom feed
  • * [PATCH v4 0/4] x86/snp: Add kexec support
           [not found] <20240409113010.465412-1-kirill.shutemov@linux.intel.com>
           [not found] ` <20240409113010.465412-6-kirill.shutemov@linux.intel.com>
    @ 2024-04-09 20:42 ` Ashish Kalra
      2024-04-09 20:42   ` [PATCH v4 1/4] efi/x86: skip efi_arch_mem_reserve() in case of kexec Ashish Kalra
                         ` (6 more replies)
           [not found] ` <20240409113010.465412-4-kirill.shutemov@linux.intel.com>
                       ` (7 subsequent siblings)
      9 siblings, 7 replies; 69+ messages in thread
    From: Ashish Kalra @ 2024-04-09 20:42 UTC (permalink / raw)
      To: tglx, mingo, bp, dave.hansen, x86
      Cc: rafael, peterz, adrian.hunter, sathyanarayanan.kuppuswamy,
    	jun.nakajima, rick.p.edgecombe, thomas.lendacky, michael.roth,
    	seanjc, kai.huang, bhe, kirill.shutemov, bdas, vkuznets,
    	dionnaglaze, anisinha, jroedel, ardb, kexec, linux-coco,
    	linux-kernel
    
    From: Ashish Kalra <ashish.kalra@amd.com>
    
    The patchset adds bits and pieces to get kexec (and crashkernel) work on
    SNP guest.
    
    v4:
    - Rebased to current tip/master.
    - Reviewed-bys from Sathya.
    - Remove snp_kexec_unprep_rom_memory() as it is not needed any more as 
      SEV-SNP code is not validating the ROM range in probe_roms() anymore.
    - Fix kernel test robot build error/warnings.
    
    v3:
    - Rebased;
    - moved Keep page tables that maps E820_TYPE_ACPI patch to Kirill's tdx
      guest kexec patch series.
    - checking the md attribute instead of checking the efi_setup for
      detecting if running under kexec kernel.
    - added new sev_es_enabled() function.
    - skip video memory access in decompressor for SEV-ES/SNP systems to 
      prevent guest termination as boot stage2 #VC handler does not handle
      MMIO.
    
    v2:
    - address zeroing of unaccepted memory table mappings at all page table levels
      adding phys_pte_init(), phys_pud_init() and phys_p4d_init().
    - include skip efi_arch_mem_reserve() in case of kexec as part of this 
      patch set.
    - rename last_address_shd_kexec to a more appropriate 
      kexec_last_address_to_make_private.
    - remove duplicate code shared with TDX and use common interfaces
      defined for SNP and TDX for kexec/kdump.
    - remove set_pte_enc() dependency on pg_level_to_pfn() and make the 
      function simpler.
    - rename unshare_pte() to make_pte_private().
    - clarify and make the comment for using kexec_last_address_to_make_private  
      more understandable.
    - general cleanup. 
    
    Ashish Kalra (4):
      efi/x86: skip efi_arch_mem_reserve() in case of kexec.
      x86/sev: add sev_es_enabled() function.
      x86/boot/compressed: Skip Video Memory access in Decompressor for
        SEV-ES/SNP.
      x86/snp: Convert shared memory back to private on kexec
    
     arch/x86/boot/compressed/misc.c |   6 +-
     arch/x86/boot/compressed/misc.h |   1 +
     arch/x86/boot/compressed/sev.c  |   5 +
     arch/x86/boot/compressed/sev.h  |   2 +
     arch/x86/include/asm/sev.h      |   4 +
     arch/x86/kernel/sev.c           | 161 ++++++++++++++++++++++++++++++++
     arch/x86/mm/mem_encrypt_amd.c   |   3 +
     arch/x86/platform/efi/quirks.c  |  20 +++-
     8 files changed, 198 insertions(+), 4 deletions(-)
    
    -- 
    2.34.1
    
    
    _______________________________________________
    kexec mailing list
    kexec@lists.infradead.org
    http://lists.infradead.org/mailman/listinfo/kexec
    
    ^ permalink raw reply	[flat|nested] 69+ messages in thread
  • [parent not found: <20240409113010.465412-4-kirill.shutemov@linux.intel.com>]
  • [parent not found: <20240409113010.465412-2-kirill.shutemov@linux.intel.com>]
  • [parent not found: <20240409113010.465412-5-kirill.shutemov@linux.intel.com>]
  • [parent not found: <20240409113010.465412-10-kirill.shutemov@linux.intel.com>]
  • [parent not found: <20240409113010.465412-7-kirill.shutemov@linux.intel.com>]
  • [parent not found: <20240409113010.465412-11-kirill.shutemov@linux.intel.com>]
  • [parent not found: <20240409113010.465412-12-kirill.shutemov@linux.intel.com>]
  • [parent not found: <20240409113010.465412-14-kirill.shutemov@linux.intel.com>]

  • end of thread, other threads:[~2024-05-10 18:36 UTC | newest]
    
    Thread overview: 69+ messages (download: mbox.gz follow: Atom feed
    -- links below jump to the message on this page --
         [not found] <20240409113010.465412-1-kirill.shutemov@linux.intel.com>
         [not found] ` <20240409113010.465412-6-kirill.shutemov@linux.intel.com>
    2024-04-09 12:38   ` [PATCHv10 05/18] x86/kexec: Keep CR4.MCE set during kexec for TDX guest Huang, Kai
    2024-04-09 14:22   ` Sean Christopherson
    2024-04-09 15:26     ` Kirill A. Shutemov
    2024-04-28 17:11       ` Borislav Petkov
    2024-04-29 13:17         ` Kirill A. Shutemov
    2024-04-29 14:45           ` Borislav Petkov
    2024-04-29 15:16             ` Kirill A. Shutemov
    2024-04-30 12:57               ` Borislav Petkov
    2024-04-30 13:03   ` Borislav Petkov
    2024-04-30 14:49     ` Kirill A. Shutemov
    2024-05-02 13:22       ` Borislav Petkov
    2024-05-02 13:38         ` Borislav Petkov
    2024-04-09 20:42 ` [PATCH v4 0/4] x86/snp: Add kexec support Ashish Kalra
    2024-04-09 20:42   ` [PATCH v4 1/4] efi/x86: skip efi_arch_mem_reserve() in case of kexec Ashish Kalra
    2024-04-09 20:42   ` [PATCH v4 2/4] x86/sev: add sev_es_enabled() function Ashish Kalra
    2024-04-09 21:21     ` Borislav Petkov
    2024-04-09 20:42   ` [PATCH v4 3/4] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP Ashish Kalra
    2024-04-09 20:43   ` [PATCH v4 4/4] x86/snp: Convert shared memory back to private on kexec Ashish Kalra
    2024-04-10 14:17     ` kernel test robot
    2024-04-15 23:22   ` [PATCH v5 0/3] x86/snp: Add kexec support Ashish Kalra
    2024-04-15 23:22     ` [PATCH v5 1/3] efi/x86: skip efi_arch_mem_reserve() in case of kexec Ashish Kalra
    2024-04-24 14:48       ` Borislav Petkov
    2024-04-24 21:17         ` Kalra, Ashish
    2024-04-25 16:45           ` Kalra, Ashish
    2024-04-26 14:21           ` Borislav Petkov
    2024-04-26 14:47             ` Kalra, Ashish
    2024-04-26 15:22               ` Borislav Petkov
    2024-04-26 15:28                 ` Kalra, Ashish
    2024-04-26 15:34                   ` Borislav Petkov
    2024-04-26 16:32                     ` Kalra, Ashish
    2024-04-15 23:23     ` [PATCH v5 2/3] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP Ashish Kalra
    2024-04-15 23:23     ` [PATCH v5 3/3] x86/snp: Convert shared memory back to private on kexec Ashish Kalra
    2024-04-26 16:33   ` [PATCH v6 0/3] x86/snp: Add kexec support Ashish Kalra
    2024-04-26 16:33     ` [PATCH v6 1/3] efi/x86: Fix EFI memory map corruption with kexec Ashish Kalra
    2024-05-09  9:56       ` Ruirui Yang
    2024-05-09 10:00         ` Dave Young
    2024-05-10 18:36         ` Kalra, Ashish
    2024-04-26 16:34     ` [PATCH v6 2/3] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP Ashish Kalra
    2024-04-26 16:35     ` [PATCH v6 3/3] x86/snp: Convert shared memory back to private on kexec Ashish Kalra
    2024-05-02 12:01   ` [PATCH v4 0/4] x86/snp: Add kexec support Alexander Graf
    2024-05-02 12:18     ` Vitaly Kuznetsov
    2024-05-03  8:32       ` Alexander Graf
    2024-05-09  9:19         ` Vitaly Kuznetsov
    2024-05-02 21:54     ` Kalra, Ashish
         [not found] ` <20240409113010.465412-4-kirill.shutemov@linux.intel.com>
    2024-04-18 14:37   ` [PATCHv10 03/18] cpu/hotplug: Add support for declaring CPU offlining not supported Borislav Petkov
    2024-04-19 13:31     ` Kirill A. Shutemov
    2024-04-23 13:17       ` Borislav Petkov
         [not found] ` <20240409113010.465412-2-kirill.shutemov@linux.intel.com>
    2024-04-18 16:03   ` [PATCHv10 01/18] x86/acpi: Extract ACPI MADT wakeup code into a separate file Borislav Petkov
    2024-04-19 13:28     ` Kirill A. Shutemov
         [not found] ` <20240409113010.465412-5-kirill.shutemov@linux.intel.com>
    2024-04-23 16:02   ` [PATCHv10 04/18] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup Borislav Petkov
    2024-04-24  8:38     ` Kirill A. Shutemov
    2024-04-24 13:50       ` Borislav Petkov
    2024-04-24 14:35         ` Kirill A. Shutemov
    2024-04-24 14:40           ` Dave Hansen
    2024-04-24 14:51             ` Borislav Petkov
         [not found] ` <20240409113010.465412-10-kirill.shutemov@linux.intel.com>
    2024-04-27 16:47   ` [PATCHv10 09/18] x86/mm: Adding callbacks to prepare encrypted memory for kexec Borislav Petkov
         [not found]     ` <20240427170634.2397725-1-kirill.shutemov@linux.intel.com>
    2024-05-02 13:45       ` [PATCHv10.1 " Borislav Petkov
    2024-05-06 13:22         ` Kirill A. Shutemov
    2024-05-06 14:21           ` Borislav Petkov
         [not found] ` <20240409113010.465412-7-kirill.shutemov@linux.intel.com>
    2024-04-28 17:25   ` [PATCHv10 06/18] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno Borislav Petkov
    2024-04-29 14:29     ` Kirill A. Shutemov
    2024-04-29 14:53       ` Borislav Petkov
    2024-05-03 16:29   ` Michael Kelley
         [not found] ` <20240409113010.465412-11-kirill.shutemov@linux.intel.com>
    2024-05-05 12:13   ` [PATCHv10 10/18] x86/tdx: Convert shared memory back to private on kexec Borislav Petkov
    2024-05-06 15:37     ` Kirill A. Shutemov
    2024-05-08 12:04       ` Borislav Petkov
    2024-05-08 13:30         ` Kirill A. Shutemov
         [not found] ` <20240409113010.465412-12-kirill.shutemov@linux.intel.com>
    2024-05-08 12:12   ` [PATCHv10 11/18] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges Borislav Petkov
         [not found] ` <20240409113010.465412-14-kirill.shutemov@linux.intel.com>
    2024-05-08 12:18   ` [PATCHv10 13/18] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure Borislav Petkov
    

    This is a public inbox, see mirroring instructions
    for how to clone and mirror all data and code used for this inbox