On Fri, Jul 07, 2023 at 10:25:15AM -0500, Michael Roth wrote: > ... > It would be unfortunate if we finally abandoned this path because of the > issue being hit here though. I think the patch posted here is the proper > resolution to the issue being hit, and I'm hoping at this point we've > identified all the similar cases where EFI/setup_data-related structures > were missing explicit mappings. But if we still think it's too much of a > liability to access the EFI config table outside of SEV-enabled guests, > then I can work on re-implementing things based on the above logic. Replying here to Tom's note too... So, I like the idea of rechecking CPUID. Yes, let's do the sev_status check. As a result, we either fail the guest - no problem - or we boot and we recheck. Thus, we don't run AMD code on !AMD machines, if the HV is not a lying bastard. Now, if we've gotten a valid setup_data SETUP_EFI entry with a valid pointer to an EFI config table, then that should happen in the generic path - initialize_identity_maps(), for example - like you've done in b57feed2cc26 - not in the kexec code because kexec *happens* to need it. We want to access the EFI config table? Sure, by all means, but make that generic for all code. Thx. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette _______________________________________________ kexec mailing list kexec@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/kexec