Message ID | 20240227181616.3032032-1-kirill.shutemov@linux.intel.com |
---|---|
Headers |
Return-Path: <linux-kernel+bounces-83809-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:a81b:b0:108:e6aa:91d0 with SMTP id bq27csp2922493dyb; Tue, 27 Feb 2024 11:36:20 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCW1OJdmfBslnHxbfjUblCF1p49IxwMAwaQoYVv2h5GsAatSq/CT/umdHoS9Gni9h+DgAB5xcPaTObOrbPKA0ikXVWuIVQ== X-Google-Smtp-Source: AGHT+IEpOpOtHoPWCrnr4VNNk6BS1++hqj0KKDv7FehWt+oYNU65RuDnLR/HqU8M2DJ5wsRq5SNR X-Received: by 2002:a05:6e02:20c7:b0:365:1035:55ab with SMTP id 7-20020a056e0220c700b00365103555abmr16146250ilq.7.1709062580312; Tue, 27 Feb 2024 11:36:20 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709062580; cv=pass; d=google.com; s=arc-20160816; b=GdsEMudrezNB12rUsGt/ilm/yM9zRcidj3NcLmP+CnsU5voT40PARuuvjeMasLDahr f880ozf+gA4afHr+O4tq2xaHSPQZOOHh32wYypAyeEXAPIhp2/UYI/hHMz3eBD74bYJ5 kfdCCM1O3JMvbaO3IxxE92YtUfAJ2qlC16Hrn9pdcujb8n0LvrVf0D5p5fgmhY2k1yh8 CrUOkzDLVfW1iiY8cOZ0L8oW2YZKKz1ZZBSJImOXoEpK/LSQ499LSO7WM3aRpWhJjANP oFOxJj+tmqMWM58LhtMDzI8ciXAvPo6wsvG+zMNZSpLh3pZe4mGa8lcfKWa+Ousu7sCF 9qVg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=SM7kXefzvoup1AtRDFIcgdqs0BkwhJGL2F5aRAxbRgs=; fh=OvJRnOqsMTm9XoNmEwebcqh9Ud7yh1CTeKAP84ols98=; b=L893h8a1DQWVxdDIS+O9QVqs1f4VugsrWqgyJfM5WFt7DxoeDQ5rpROrGIWh187cK4 +NgUWD21jyfoBl5VbwudQJ5AZn52rbZWonwPIGxOTBKg+lAuom2u/XySXKXlW/nzh2pQ nbcPVgjhLyF+PdINTsvjGGh2TVMgwPsLU4CCsYtZI1+ueWj5mGkJwwDEeGof2ZWfWp83 acEJqBpXamEzFu8voRmUpYOL3pImlUCSFNZ1zA3kyYRjQIKV5512mnEXh6oKl9LevezS wN/0Ux4yWZCp6weeB3yXLFaWGKsChMIHPL8lxr5s8nI3C9FqXaFHi/w3+c8uG0ezCwSp EjhQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=X8mfsdrZ; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-83809-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-83809-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id l130-20020a633e88000000b005dc81a30772si6019884pga.301.2024.02.27.11.36.20 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 27 Feb 2024 11:36:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-83809-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=X8mfsdrZ; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-83809-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-83809-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 927F328A1E4 for <ouuuleilei@gmail.com>; Tue, 27 Feb 2024 18:17:46 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 46B7914AD22; Tue, 27 Feb 2024 18:17:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="X8mfsdrZ" Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 82BF91487C6 for <linux-kernel@vger.kernel.org>; Tue, 27 Feb 2024 18:16:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.8 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709057818; cv=none; b=EDn5esUzFKk/mRxc9FW1wfqGXmpEy0tVnye5G+ah7MG0pnVIykB+TSCyZblicgCkajGwXAIu9CtdhaqXrmYDViDPYtDWOgmeXbQ32QXk1XSir6D+5gm8fh2vepnle59cMuS0ZuJPHPY3jiXS2LiOfQFARihDzeD0LYASbv4umuY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709057818; c=relaxed/simple; bh=SEZ8jxBM2IsN8xutD1hTBWTLFmPpKOV0gcNKpu6NHvc=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=ALMy59ninC3pRfN9UUgGx96myVlD+vX39ph0e3QXEEZN1+Xb9eWIHj8y/62pqkMyhOtHpjKxgLBT110QrnEOrC3kRbkBAZBNYp+yJWUNgPjv4kYn3gF1WLUYwRofJEuppn2Iy14zmWJldQaPSx5bG+FMubs2JozPllkijbRK1+A= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.helo=mgamail.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=X8mfsdrZ; arc=none smtp.client-ip=192.198.163.8 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.helo=mgamail.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1709057816; x=1740593816; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=SEZ8jxBM2IsN8xutD1hTBWTLFmPpKOV0gcNKpu6NHvc=; b=X8mfsdrZWihTQcn/lnfRTSmo7QGl/n2uXgPACwtMWmQDRpsGew269kop zWczXwZ7gbL6eBRZqedUPxsQhw8GA/fSYfdQeLKXc5lx9xRQbhNc9n7hD lghUk2Y0CYL0pxhP/vok1ABTaKdv7MoD7vg444TyfuNmRJYL9qxk2RDaO 3N2SMVEZ4RRODLIxzq8173zzHJkEZQ0GdtKpkFajzZ2LeCTRsn9zpwZ8V rXBPBcOKcdeiJyAu0vuomHnodXHSY4oHTfgZI+H2OxDePBqkWUhSYqWG8 zBAH+USwGj8FhCPjRA7eCaPSortDEK8NYKZB6xUI750eAE+mmjkS3y+hZ w==; X-IronPort-AV: E=McAfee;i="6600,9927,10996"; a="20966049" X-IronPort-AV: E=Sophos;i="6.06,188,1705392000"; d="scan'208";a="20966049" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmvoesa102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Feb 2024 10:16:25 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10996"; a="937032707" X-IronPort-AV: E=Sophos;i="6.06,188,1705392000"; d="scan'208";a="937032707" Received: from black.fi.intel.com ([10.237.72.28]) by fmsmga001.fm.intel.com with ESMTP; 27 Feb 2024 10:16:20 -0800 Received: by black.fi.intel.com (Postfix, from userid 1000) id 3066E284; Tue, 27 Feb 2024 20:16:19 +0200 (EET) From: "Kirill A. Shutemov" <kirill.shutemov@linux.intel.com> To: Thomas Gleixner <tglx@linutronix.de>, Ingo Molnar <mingo@redhat.com>, Borislav Petkov <bp@alien8.de>, Dave Hansen <dave.hansen@linux.intel.com>, x86@kernel.org Cc: "Rafael J. Wysocki" <rafael@kernel.org>, Peter Zijlstra <peterz@infradead.org>, Adrian Hunter <adrian.hunter@intel.com>, Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@linux.intel.com>, Elena Reshetova <elena.reshetova@intel.com>, Jun Nakajima <jun.nakajima@intel.com>, Rick Edgecombe <rick.p.edgecombe@intel.com>, Tom Lendacky <thomas.lendacky@amd.com>, "Kalra, Ashish" <ashish.kalra@amd.com>, Sean Christopherson <seanjc@google.com>, "Huang, Kai" <kai.huang@intel.com>, Baoquan He <bhe@redhat.com>, kexec@lists.infradead.org, linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" <kirill.shutemov@linux.intel.com> Subject: [PATCHv8 00/16] x86/tdx: Add kexec support Date: Tue, 27 Feb 2024 20:16:00 +0200 Message-ID: <20240227181616.3032032-1-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1792082004349307102 X-GMAIL-MSGID: 1792082004349307102 |
Series |
x86/tdx: Add kexec support
|
|
Message
Kirill A. Shutemov
Feb. 27, 2024, 6:16 p.m. UTC
The patchset adds bits and pieces to get kexec (and crashkernel) work on TDX guest. The last patch implements CPU offlining according to the approved ACPI spec change poposal[1]. It unlocks kexec with all CPUs visible in the target kernel. It requires BIOS-side enabling. If it missing we fallback to booting 2nd kernel with single CPU. Please review. I would be glad for any feedback. [1] https://lore.kernel.org/all/13356251.uLZWGnKmhe@kreacher v8: - Rework serialization of around conversion memory back to private; - Print ACPI_MADT_TYPE_MULTIPROC_WAKEUP in acpi_table_print_madt_entry(); - Drop debugfs interface to dump info on shared memory; - Adjust comments and commit messages; - Reviewed-bys by Baoquan, Dave and Thomas; v7: - Call enc_kexec_stop_conversion() and enc_kexec_unshare_mem() after shutting down IO-APIC, lapic and hpet. It meets AMD requirements. - Minor style changes; - Add Acked/Reviewed-bys; v6: - Rebased to v6.8-rc1; - Provide default noop callbacks from .enc_kexec_stop_conversion and .enc_kexec_unshare_mem; - Split off patch that introduces .enc_kexec_* callbacks; - asm_acpi_mp_play_dead(): program CR3 directly from RSI, no MOV to RAX required; - Restructure how smp_ops.stop_this_cpu() hooked up in crash_nmi_callback(); - kvmclock patch got merged via KVM tree; v5: - Rename smp_ops.crash_play_dead to smp_ops.stop_this_cpu and use it in stop_this_cpu(); - Split off enc_kexec_stop_conversion() from enc_kexec_unshare_mem(); - Introduce kernel_ident_mapping_free(); - Add explicit include for alternatives and stringify. - Add barrier() after setting conversion_allowed to false; - Mark cpu_hotplug_offline_disabled __ro_after_init; - Print error if failed to hand over CPU to BIOS; - Update comments and commit messages; v4: - Fix build for !KEXEC_CORE; - Cleaner ATLERNATIVE use; - Update commit messages and comments; - Add Reviewed-bys; v3: - Rework acpi_mp_crash_stop_other_cpus() to avoid invoking hotplug state machine; - Free page tables if reset vector setup failed; - Change asm_acpi_mp_play_dead() to pass reset vector and PGD as arguments; - Mark acpi_mp_* variables as static and __ro_after_init; - Use u32 for apicid; - Disable CPU offlining if reset vector setup failed; - Rename madt.S -> madt_playdead.S; - Mark tdx_kexec_unshare_mem() as static; - Rebase onto up-to-date tip/master; - Whitespace fixes; - Reorder patches; - Add Reviewed-bys; - Update comments and commit messages; v2: - Rework how unsharing hook ups into kexec codepath; - Rework kvmclock_disable() fix based on Sean's; - s/cpu_hotplug_not_supported()/cpu_hotplug_disable_offlining()/; - use play_dead_common() to implement acpi_mp_play_dead(); - cond_resched() in tdx_shared_memory_show(); - s/target kernel/second kernel/; - Update commit messages and comments; Kirill A. Shutemov (16): x86/acpi: Extract ACPI MADT wakeup code into a separate file x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init cpu/hotplug: Add support for declaring CPU offlining not supported cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup x86/kexec: Keep CR4.MCE set during kexec for TDX guest x86/mm: Make x86_platform.guest.enc_status_change_*() return errno x86/mm: Return correct level from lookup_address() if pte is none x86/tdx: Account shared memory x86/mm: Adding callbacks to prepare encrypted memory for kexec x86/tdx: Convert shared memory back to private on kexec x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure x86/acpi: Do not attempt to bring up secondary CPUs in kexec case x86/smp: Add smp_ops.stop_this_cpu() callback x86/mm: Introduce kernel_ident_mapping_free() x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method arch/x86/Kconfig | 7 + arch/x86/coco/core.c | 1 - arch/x86/coco/tdx/tdx.c | 209 ++++++++++++++++++- arch/x86/hyperv/ivm.c | 9 +- arch/x86/include/asm/acpi.h | 7 + arch/x86/include/asm/init.h | 3 + arch/x86/include/asm/pgtable_types.h | 1 + arch/x86/include/asm/smp.h | 1 + arch/x86/include/asm/x86_init.h | 6 +- arch/x86/kernel/acpi/Makefile | 11 +- arch/x86/kernel/acpi/boot.c | 86 +------- arch/x86/kernel/acpi/madt_playdead.S | 28 +++ arch/x86/kernel/acpi/madt_wakeup.c | 292 +++++++++++++++++++++++++++ arch/x86/kernel/crash.c | 6 + arch/x86/kernel/e820.c | 9 +- arch/x86/kernel/process.c | 7 + arch/x86/kernel/reboot.c | 18 ++ arch/x86/kernel/relocate_kernel_64.S | 5 + arch/x86/kernel/x86_init.c | 8 +- arch/x86/mm/ident_map.c | 73 +++++++ arch/x86/mm/mem_encrypt_amd.c | 8 +- arch/x86/mm/pat/set_memory.c | 17 +- include/acpi/actbl2.h | 19 +- include/linux/cc_platform.h | 10 - include/linux/cpu.h | 2 + kernel/cpu.c | 12 +- 26 files changed, 715 insertions(+), 140 deletions(-) create mode 100644 arch/x86/kernel/acpi/madt_playdead.S create mode 100644 arch/x86/kernel/acpi/madt_wakeup.c
Comments
Please disregard. I've sent old patches by mistake.