Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp1047216rdb; Tue, 30 Jan 2024 06:34:32 -0800 (PST) X-Google-Smtp-Source: AGHT+IEQ5etDj0NkU5yQVNKo9MG4Hve7hM77/2wwnhUPlVEwnRcFPKZjcTNaCfABfPPY1k/SYO9k X-Received: by 2002:a05:6a00:4b16:b0:6db:d285:ee3e with SMTP id kq22-20020a056a004b1600b006dbd285ee3emr7769743pfb.23.1706625272361; Tue, 30 Jan 2024 06:34:32 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706625272; cv=pass; d=google.com; s=arc-20160816; b=amkFB9qAnIQ/WetxNMCWByf2gIlt3hIGGhOWBCHMPcL0mzUX3x3kOcj32xJCLSuGPr aZky4/9CQkpYjp/aTzAtiuMeKmbW32nx1ZGq4hX397ySZfvAexi3yn56t7KzfNhlTnTe AftPP2Qu2yl+lUCjHsPm8QRdimBgv53PXYavlZoBZkiw9RHaUOAwidN+kAERrz7fHC0n wBEflsBW0gygnp/qcIC9abnxqUgGGYNSP3Nj2/35EJo8HTtga+cT8VnoLwkq6ux8mZru VP+lcdZFoJP6aqb5p1mBo0XqRKFxj+4pGtmh8vNDDi1dodxIwI59Q5TubKOnjpHq9tt3 GYvg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=kFaUaLgZePTfDVehzcA501ujMjUIeqP27O+BvAciIs0=; fh=Io6SxXTladQBXvOI3dSqwNNcjSJwjbC/FdM0FBPo8Ic=; b=MDs8zlg0n/UfKUWlxHZPLiAY/9QjLKJTZ8sb6hnVF9TBERIut1LZ0sGdiWIpp7/u4/ BPJEwO8xQ/OGIUcnUgvKN36lAi6LYyquIzV6bDPOxkSgpYu8hYxXuFdz91QUE6Q34llP ZTSqzzGWNglDQsWFqZpEIaWCX8MbbjlAPJXvJ3OTiTFaSGQgKvmrjFVMTMxUVDO18/y6 KONpNWIyAAaZtkDnvwwkUj2Xq287bdxFqjlBBcTzB5GmaH1yHdyJIQ+yeiK1SUZAq3/g 4y/pnrr810P6VRwlIgpzpbVq16Q2HzUyRCGA18ZHiukiuWAg50bkhG+y0P81QkGyP/nf pH1A== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=cWGtrYEx; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-44756-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-44756-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id e19-20020aa78c53000000b006ddd3208911si7368646pfd.155.2024.01.30.06.34.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Jan 2024 06:34:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-44756-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=cWGtrYEx; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-44756-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-44756-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 040CC282C5C for ; Tue, 30 Jan 2024 14:34:32 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E54887C08F; Tue, 30 Jan 2024 14:34:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="cWGtrYEx" Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9D10476901 for ; Tue, 30 Jan 2024 14:34:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.13 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706625265; cv=none; b=ImnBQ6Nk3vw/sQ1na99iiObAbiCHojrl4T+MIknq+8IdF/U3uMElRMIsS24eQIq7WoU1UK8FIC/orG/ma3U+bncB4ZIJ3us1c7TMvPM5FdlaQTTTOlj/nbZfhXFkcp782CkZ7Vi7ztZ0vBfWxej5EoOBfoP3xO5kaIEhWr/p4I8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706625265; c=relaxed/simple; bh=eXnTC9Z2V42A4QwsNLM6X9tA1dlLLPk9DhFjZa7uZJw=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=fdr8qMpXqOGBw4Z1Pzc3OLovsN6k2vhfDzCgmm9Fo38PSbfatRHEKXgRLv/QBCdF0ZpjImuNh1uYtFHKusAZwqzYKjAtpayzHpjp9s8xmybJPtXGp+NSkTbqS6RwVwS9ql9fp80heNlUUoXio+jx1U1ht2CiwlV1UQSGzhhyWNk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=cWGtrYEx; arc=none smtp.client-ip=192.198.163.13 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1706625263; x=1738161263; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=eXnTC9Z2V42A4QwsNLM6X9tA1dlLLPk9DhFjZa7uZJw=; b=cWGtrYEx9VY5b11GQNdY0gB42o0HbBg852PcjeiToDCXF5g+jbEPhaHp kkmH6kdfUS9gu20tX1S3fyJlLHP3j7DPccqfcvoYZwJEx5W9ET11gMgpa 6wVP4lBqUzoIDEtv5+1hszyB7JYF2YNm7izzPbBUAcOyJgyeEjBvOXVm2 Kt9Am6cCOOtEqXWngePlwEu3MQx2iWkOMjceYtJU8Cag0Akf02dXrC8o6 GYw237g9bTHTnNwotMzTvtf9FL06bvO2gx5XzaU+UeTNxYkWgCmbALO5n jwlkChRVGAhTJqNnZI7KBdlt+Z1cKAMArakS/493P/0iBezXSm319KrTx g==; X-IronPort-AV: E=McAfee;i="6600,9927,10968"; a="2231359" X-IronPort-AV: E=Sophos;i="6.05,707,1701158400"; d="scan'208";a="2231359" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmvoesa107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Jan 2024 06:34:16 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10968"; a="961297757" X-IronPort-AV: E=Sophos;i="6.05,707,1701158400"; d="scan'208";a="961297757" Received: from black.fi.intel.com ([10.237.72.28]) by orsmga005.jf.intel.com with ESMTP; 30 Jan 2024 06:34:10 -0800 Received: by black.fi.intel.com (Postfix, from userid 1000) id 59D49E6; Tue, 30 Jan 2024 15:55:57 +0200 (EET) Date: Tue, 30 Jan 2024 15:55:57 +0200 From: "Kirill A. Shutemov" To: Paolo Bonzini Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "Rafael J. Wysocki" , Peter Zijlstra , Adrian Hunter , Kuppuswamy Sathyanarayanan , Elena Reshetova , Jun Nakajima , Rick Edgecombe , Tom Lendacky , "Kalra, Ashish" , Sean Christopherson , "Huang, Kai" , Baoquan He , kexec@lists.infradead.org, linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org Subject: Re: [PATCHv6 00/16] x86/tdx: Add kexec support Message-ID: References: <20240124125557.493675-1-kirill.shutemov@linux.intel.com> <3f44458f-2b4a-4464-a3df-cb791298dafc@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3f44458f-2b4a-4464-a3df-cb791298dafc@redhat.com> On Tue, Jan 30, 2024 at 02:43:15PM +0100, Paolo Bonzini wrote: > On 1/24/24 13:55, Kirill A. Shutemov wrote: > > The patchset adds bits and pieces to get kexec (and crashkernel) work on > > TDX guest. > > > > The last patch implements CPU offlining according to the approved ACPI > > spec change poposal[1]. It unlocks kexec with all CPUs visible in the target > > kernel. It requires BIOS-side enabling. If it missing we fallback to booting > > 2nd kernel with single CPU. > > > > Please review. I would be glad for any feedback. > > Hi Kirill, > > I have a very basic question: is there a reason why this series does not > revert commit cb8eb06d50fc, "x86/virt/tdx: Disable TDX host support when > kexec is enabled"? My patchset enables kexec for TDX guest. The commit you refer blocks kexec for host. TDX host and guest have totally different problems with handling kexec. Kai looks on how to get host kexec functional. -- Kiryl Shutsemau / Kirill A. Shutemov