Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp1123394rdb; Tue, 30 Jan 2024 08:31:26 -0800 (PST) X-Google-Smtp-Source: AGHT+IF0SM6jt7DH3SS16PSlyFioNTBbqrM0JM3VlvIecQTPM1cw5lBcdTmx3umG4/3GGknasvfE X-Received: by 2002:a05:6402:3482:b0:55e:7e8a:195d with SMTP id v2-20020a056402348200b0055e7e8a195dmr7163059edc.5.1706632286238; Tue, 30 Jan 2024 08:31:26 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706632286; cv=pass; d=google.com; s=arc-20160816; b=L7XgDgOr+weg8SeQEWYd+TK9MP2aDXpSfKni+7r6eYVntRQ24e0De4QzeXyKkHi/fN x8v3kcONfMfGRJUvO2q+FInkLzM+70P2pOvFnv6I/czv7rO65OYH0e6D5xuVtM/dE6aN LgjqiMMzJyDyFpUj/3FLpo32bXWJgYUld4fwDkjwS6piI/cx2HhC485ymclvIRfkSxW3 YrGTpAw2+dVYXa1b5DvL8dnOI+6zdkMvJYn1RQasK+C+8npX9GcONFUdjEvZD7AMgxOV 5DoxGGBwz89gysc0GirLlFfc6xbNBMm7Pr7GrMNfIL46iO+ocKAG8TZ192mf+dHCFzPp RQNA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:subject:cc:to:from:date:dkim-signature; bh=hral2cGNI3JLnhysb7XNZEqGJ+xQj0IIgUV6IAZLJKk=; fh=Io6SxXTladQBXvOI3dSqwNNcjSJwjbC/FdM0FBPo8Ic=; b=xFC7iC2Z+4BGdjH//x0NWSLvXBnb2T1dZfyiOwFqPYRxH01xuWV9VjPawg0bSYQMOz 8F2YXQPFSQWLAGuCvP+Jigb27iRPZOtt/hX0Fu2bXclAo/GUH+8Gbi+/+ieKlTUufBCo godCsjPQYwwPIfPb/f20yoT9PG1b9YnpsS8Pb+S6Ivc3XaeblRiXtUaDJOFbX5iQh4NB j6owe0AbjJTKgcuUtsGwV+peLw276FuWuUfLr/fOWeYeSPXRFQ32GkcLrHxZllbwwf8F Sf3OxP7y2/V7a+UaWeCqYZkvJrL48o5I4GqgGJT++pKhMbC4sjHNwHJuKLs92Er1OGME NvzQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="A/LvQMKK"; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-44815-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-44815-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id cs12-20020a0564020c4c00b0055d399cff3fsi4491191edb.578.2024.01.30.08.31.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Jan 2024 08:31:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-44815-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="A/LvQMKK"; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-44815-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-44815-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 8AF021F27932 for ; Tue, 30 Jan 2024 15:15:38 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8925C8121B; Tue, 30 Jan 2024 15:15:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="A/LvQMKK" Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 541FE6D1A8 for ; Tue, 30 Jan 2024 15:15:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.55.52.88 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706627730; cv=none; b=rXkPzRj8eTYGcHphuqElMdbcYL1cwJt4e26ruNA/1vBesaf7SSg6F0NZ5C9qhnnZh5mpHqFiBhNlju4zG9CDUTFmEGCU3mC+vI7M5sqtFSbnnAlHgWW5yWAtbJyZuvN7amZCP/7PFycfbMN7pkjxqL87dvCrYAe/EpS9exCQxD8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706627730; c=relaxed/simple; bh=cg4Vqit6KxU2rQTAj377CjGsVM4isPa7zNpJYoTP4as=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=FFSDSLMs7HkK67CpnsrfgSc9LMpEHiUkn99M5NLwLZ2gwcQYfRc8if5qSRsyZKOyO989IytNQdThC63JIaqpBLdLWKofnweoMZoRHFAmLi6qRCv/ENU2dQ35yZ4R8DyHjBWfE3tiZwFIgX+vUoVeqWUxcC3KpXDlkFYG8gnnKyU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=A/LvQMKK; arc=none smtp.client-ip=192.55.52.88 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1706627729; x=1738163729; h=date:from:to:cc:subject:message-id:references: mime-version:content-transfer-encoding:in-reply-to; bh=cg4Vqit6KxU2rQTAj377CjGsVM4isPa7zNpJYoTP4as=; b=A/LvQMKKosaoNYic0i05z2Ua9dRzxELSBlZrPPtYhlBI6ObUbKJwtbWe 7g968SEiVYVy6x4yEhQDXp/FTF7YiGvOanusgEFMJLnz1Ey3yImJs9Tox 2nDM6NlYUgBVzYLcLsmZDi50Gw+3NuLdnUCgDKjI28xfm5Fo6+y7AftmG n6lHXF7gToG6uCkctAGGg19NXk1M1k3j67YhQ+6y0VDd49Bku9Onlu8GE J+x08bbUaRtW2kUjAqr1Ic2YrgdcaeKIMC0CsOEi5+JqM/xZcxHY6TDEA TyNfqdJio/O6fv0BpITKbkUIHPKsqJQMvNsJy2dZhjKWwPcOckUKGFHFG A==; X-IronPort-AV: E=McAfee;i="6600,9927,10968"; a="434482028" X-IronPort-AV: E=Sophos;i="6.05,707,1701158400"; d="scan'208";a="434482028" Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Jan 2024 07:15:28 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10968"; a="737804714" X-IronPort-AV: E=Sophos;i="6.05,707,1701158400"; d="scan'208";a="737804714" Received: from black.fi.intel.com ([10.237.72.28]) by orsmga003.jf.intel.com with ESMTP; 30 Jan 2024 07:15:22 -0800 Received: by black.fi.intel.com (Postfix, from userid 1000) id 5FA15DE; Tue, 30 Jan 2024 17:15:21 +0200 (EET) Date: Tue, 30 Jan 2024 17:15:21 +0200 From: "Kirill A. Shutemov" To: Paolo Bonzini Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "Rafael J. Wysocki" , Peter Zijlstra , Adrian Hunter , Kuppuswamy Sathyanarayanan , Elena Reshetova , Jun Nakajima , Rick Edgecombe , Tom Lendacky , "Kalra, Ashish" , Sean Christopherson , "Huang, Kai" , Baoquan He , kexec@lists.infradead.org, linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org Subject: Re: [PATCHv6 00/16] x86/tdx: Add kexec support Message-ID: References: <20240124125557.493675-1-kirill.shutemov@linux.intel.com> <3f44458f-2b4a-4464-a3df-cb791298dafc@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: On Tue, Jan 30, 2024 at 03:59:34PM +0100, Paolo Bonzini wrote: > On Tue, Jan 30, 2024 at 3:34 PM Kirill A. Shutemov > wrote: > > > > On Tue, Jan 30, 2024 at 02:43:15PM +0100, Paolo Bonzini wrote: > > > On 1/24/24 13:55, Kirill A. Shutemov wrote: > > > > The patchset adds bits and pieces to get kexec (and crashkernel) work on > > > > TDX guest. > > > > > > > > The last patch implements CPU offlining according to the approved ACPI > > > > spec change poposal[1]. It unlocks kexec with all CPUs visible in the target > > > > kernel. It requires BIOS-side enabling. If it missing we fallback to booting > > > > 2nd kernel with single CPU. > > > > > > > > Please review. I would be glad for any feedback. > > > > > > Hi Kirill, > > > > > > I have a very basic question: is there a reason why this series does not > > > revert commit cb8eb06d50fc, "x86/virt/tdx: Disable TDX host support when > > > kexec is enabled"? > > > > My patchset enables kexec for TDX guest. The commit you refer blocks kexec > > for host. TDX host and guest have totally different problems with handling > > kexec. Kai looks on how to get host kexec functional. > > Yeah, that was right there in the cover letter (and I should have > gotten a clue from the many references to CC_* constants...). Somebody > pointed me to this series as "the TDX kexec series from Intel" and I > had some tunnel vision issues. Sorry for the noise! > > But since I have your attention, do you have a pointer to the > corresponding edk2 series? Relevant code can be found here: https://github.com/tianocore/edk2-staging/commits/tdvf-kexec/ -- Kiryl Shutsemau / Kirill A. Shutemov