Received: by 2002:a05:7412:518d:b0:e2:908c:2ebd with SMTP id fn13csp356104rdb; Thu, 5 Oct 2023 07:57:51 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH1+N25w84YsAEz0+BZ6ifdGkjoC37qh8MM73RohQ1B+gWCwIZPTAvSyeFFQiG0dYhr+Yg5 X-Received: by 2002:a05:6358:339e:b0:142:d1cb:48ab with SMTP id i30-20020a056358339e00b00142d1cb48abmr6184361rwd.15.1696517871444; Thu, 05 Oct 2023 07:57:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696517871; cv=none; d=google.com; s=arc-20160816; b=ea0Fa62n8azqxd4VWETfn15k5xrTu1HODYHFj090Yp4l+QylomT4Vr53wc29dwJvTe UikFSBEIv0HGfGBGj+2SD/Xn3miGwT5fljcEX1AWI8ayKQFoVJj1hSzFoaYcVH7O+8jk dUZQC2dYmb/4tJroAJXxb1Fbt6LjMIhc/nd64ZFn5dxinT3YUNl4bd9ovcEM9EX9JW5q PTv9hhgtp5KBVDks44FY3Y1rWa/HjP+7MD/l/LdxttwquwsH+bcBAvsLNII93qxy9dF9 zqoxL+Or8iTSTlYZzxuRY7DoEDe1sVyd0wLRR5N02aLy8KDJiT///X4BPJvWdrBDXe4n CB5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=/Ril4iOUfctyDCMr9AM4cCNZQo9/jEJOJecRhoRuvxs=; fh=F1gpqSS/HYttK+doOKuW4yrAifo5qykyq1MCI9SIQmQ=; b=JxRCtQnHw7RbotwkmbzKhNUltiv5Ilo7tkgjaTKdfPxVlqOaX+oNPb2hsRUYyCEMiD f41lCLnInyz62+Wlq8XHPgQMUrYBnfnohXuEcK0AG4nzpOnFFtZPH7WW7ByHZ2xiLFgf 1n7hgQoc0FOR/4pyqqGhPQ0898SXiIoDmjlfJY+tsjlZETaPmVjj3aCb585fgeHbGI4g wenPDYhZhd24XeKE7dnE9nIJLu7UzIvifWkJvsWNAf+dHmPa+nc+CxxmbKt2ro2jifbp KG56zc5CcZOsEVLihxTFj/+IFMKnEblQxA/S+IThdBOnBe/Xa9wQe1Z8aZVogkEXQtIw dHdg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="F/BN4COZ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id m24-20020a17090a7f9800b00262e3c1c1efsi1734878pjl.79.2023.10.05.07.57.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Oct 2023 07:57:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="F/BN4COZ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 8509C82F348C; Thu, 5 Oct 2023 07:57:50 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238917AbjJEOn5 (ORCPT + 99 others); Thu, 5 Oct 2023 10:43:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44696 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237254AbjJEOiw (ORCPT ); Thu, 5 Oct 2023 10:38:52 -0400 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.93]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 76AD46604 for ; Thu, 5 Oct 2023 07:04:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1696514676; x=1728050676; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=ZXJ1Loo2clcYjSHbu/5/7ENvQ/32ZeG1I2EOrnfZPoM=; b=F/BN4COZSPKyMUubEacf2SietLnUenHSrYUCGYR+umuWiLh92XrKhpP6 x2j9oXbMp3URXh/H/CTlljUm9RmX0UXRnzRuAeE3dUpSVyly/YGudDe6a PIpj4Tss1CiR3i39I4VpC09bHjcj178hgwsEaRjOrtCRHmTVD9YhA/BcR X8Nux3mh7rcNlfTqMPQh0yrr7XwQ+Qscuh2QswvqTs2MWfD1wZ5JvweM2 ey1KK0mBCfE8CEeux9Hjp25ZC02SZa7+2p9vQzhuqzxP6Ahq7wygRUxov k654xCHQugX/+ynOYxgct4pl8uViASPGSHvOB5TPPetl5y3Aku0MX4T4l Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10854"; a="380767054" X-IronPort-AV: E=Sophos;i="6.03,203,1694761200"; d="scan'208";a="380767054" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Oct 2023 06:14:21 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10854"; a="728449203" X-IronPort-AV: E=Sophos;i="6.03,203,1694761200"; d="scan'208";a="728449203" Received: from skwasnia-mobl.ger.corp.intel.com (HELO box.shutemov.name) ([10.251.222.71]) by orsmga006-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Oct 2023 06:14:16 -0700 Received: by box.shutemov.name (Postfix, from userid 1000) id 0F3D410A12D; Thu, 5 Oct 2023 16:14:14 +0300 (+03) From: "Kirill A. Shutemov" To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org Cc: "Rafael J. Wysocki" , Peter Zijlstra , Adrian Hunter , Kuppuswamy Sathyanarayanan , Elena Reshetova , Jun Nakajima , Rick Edgecombe , Tom Lendacky , kexec@lists.infradead.org, linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Subject: [PATCH 00/13] x86/tdx: Add kexec support Date: Thu, 5 Oct 2023 16:13:49 +0300 Message-ID: <20231005131402.14611-1-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.41.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_NONE,SPF_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 05 Oct 2023 07:57:50 -0700 (PDT) The patchset adds bits and pieces to get kexec (and crashkernel) work on TDX guest. They bring kexec support to the point when we can start the new kernel, but it will only be able to use single CPU. It should be enough to cover the most common case: crashkernel. The last patch implements CPU offlining according to the approved ACPI spec change poposal[1]. It unlocks kexec with all CPUs visible in the target kernel. Please review. I would be glad for any feedback. [1] https://lore.kernel.org/all/13356251.uLZWGnKmhe@kreacher Kirill A. Shutemov (13): x86/acpi: Extract ACPI MADT wakeup code into a separate file kernel/cpu: Add support for declaring CPU hotplug not supported cpu/hotplug, x86/acpi: Disable CPU hotplug for ACPI MADT wakeup x86/kvm: Do not try to disable kvmclock if it was not enabled x86/kexec: Keep CR4.MCE set during kexec for TDX guest x86/mm: Make x86_platform.guest.enc_status_change_*() return errno x86/mm: Return correct level from lookup_address() if pte is none KVM: x86: Add config option to gate emergency virt callback support x86/tdx: Account shared memory x86/tdx: Convert shared memory back to private on kexec x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges x86/acpi: Do not attempt to bring up secondary CPUs in kexec case x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method arch/x86/Kconfig | 8 + arch/x86/coco/core.c | 1 - arch/x86/coco/tdx/kexec.c | 0 arch/x86/coco/tdx/tdx.c | 220 +++++++++++++++++++++- arch/x86/hyperv/ivm.c | 9 +- arch/x86/include/asm/acpi.h | 5 + arch/x86/include/asm/pgtable_types.h | 1 + arch/x86/include/asm/reboot.h | 4 +- arch/x86/include/asm/x86_init.h | 4 +- arch/x86/kernel/acpi/Makefile | 11 +- arch/x86/kernel/acpi/boot.c | 88 +-------- arch/x86/kernel/acpi/madt.S | 28 +++ arch/x86/kernel/acpi/madt_wakeup.c | 262 +++++++++++++++++++++++++++ arch/x86/kernel/e820.c | 9 +- arch/x86/kernel/kvmclock.c | 9 +- arch/x86/kernel/reboot.c | 4 +- arch/x86/kernel/relocate_kernel_64.S | 5 + arch/x86/kernel/x86_init.c | 4 +- arch/x86/kvm/Kconfig | 5 + arch/x86/mm/mem_encrypt_amd.c | 8 +- arch/x86/mm/pat/set_memory.c | 17 +- include/acpi/actbl2.h | 19 +- include/linux/cc_platform.h | 10 - include/linux/cpu.h | 2 + kernel/cpu.c | 17 +- 25 files changed, 604 insertions(+), 146 deletions(-) create mode 100644 arch/x86/coco/tdx/kexec.c create mode 100644 arch/x86/kernel/acpi/madt.S create mode 100644 arch/x86/kernel/acpi/madt_wakeup.c -- 2.41.0