From patchwork Wed Jun 26 13:52:24 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Thibault Ferrante X-Patchwork-Id: 1952640 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=185.125.189.65; helo=lists.ubuntu.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=patchwork.ozlabs.org) Received: from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4W8NSQ1kqTz20XB for ; Wed, 26 Jun 2024 23:52:53 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=lists.ubuntu.com) by lists.ubuntu.com with esmtp (Exim 4.86_2) (envelope-from ) id 1sMT4i-0006L2-7Z; Wed, 26 Jun 2024 13:52:40 +0000 Received: from smtp-relay-canonical-0.internal ([10.131.114.83] helo=smtp-relay-canonical-0.canonical.com) by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1sMT4g-0006Ko-T9 for kernel-team@lists.ubuntu.com; Wed, 26 Jun 2024 13:52:38 +0000 Received: from Q58-sff.fritz.box (2.general.thibf.uk.vpn [10.172.200.120]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-0.canonical.com (Postfix) with ESMTPSA id 5953640144; Wed, 26 Jun 2024 13:52:38 +0000 (UTC) From: Thibault Ferrante To: kernel-team@lists.ubuntu.com Subject: [SRU][N:intel][PATCH 0/8] Support Kexec/Kdump Date: Wed, 26 Jun 2024 15:52:24 +0200 Message-ID: <20240626135232.2731811-1-thibault.ferrante@canonical.com> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" BugLink: https://bugs.launchpad.net/bugs/2070356 [ Impact ] Kexec is currently disabled on linux-intel as it was incompatible with tdx. These patch make it possible to use it at the same time than TDX [ Fix ] A backport of the kexec enablement for tdx on 6.8 has been done by intel. [ Test Plan ] Use kexec to do a kdump on hardware support tdx. It was tested by Intel and me on dedicated hardware. [ Where problems could occur ] Regression on TDX/Kexec related features. Gerd Hoffmann (2): UBUNTU: SAUCE: KVM: x86: Don't advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID UBUNTU: SAUCE: KVM: x86: Advertise max mappable GPA in CPUID.0x80000008.GuestPhysBits Kai Huang (5): UBUNTU: SAUCE: x86/kexec: do unconditional WBINVD for bare-metal in stop_this_cpu() UBUNTU: SAUCE: x86/kexec: do unconditional WBINVD for bare-metal in relocate_kernel() UBUNTU: SAUCE: x86/kexec: Reset TDX private memory on platforms with TDX erratum UBUNTU: SAUCE: x86/virt/tdx: Remove the !KEXEC_CORE dependency UBUNTU: SAUCE: x86/virt/tdx: Add TDX memory reset notifier to reset other private pages Thibault Ferrante (1): UBUNTU: [Config] intel: Enable KEXEC/KDUMP related config arch/x86/Kconfig | 1 - arch/x86/include/asm/kexec.h | 2 +- arch/x86/include/asm/tdx.h | 16 +++++ arch/x86/kernel/machine_kexec_64.c | 29 ++++++-- arch/x86/kernel/process.c | 19 +++-- arch/x86/kernel/relocate_kernel_64.S | 19 +++-- arch/x86/kvm/cpuid.c | 41 ++++++++--- arch/x86/kvm/mmu.h | 2 + arch/x86/kvm/mmu/mmu.c | 5 ++ arch/x86/virt/vmx/tdx/tdx.c | 100 +++++++++++++++++++++++++++ debian.intel/config/annotations | 30 -------- 11 files changed, 203 insertions(+), 61 deletions(-) Acked-by: Philip Cox Acked-by: John Cabaj