Re: [PATCH v2 0/2] x86: Disable kexec for SEV-ES guests

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Gentle ping.

On Thu, Jun 03, 2021 at 03:22:31PM +0200, Joerg Roedel wrote:
> From: Joerg Roedel <jroedel@xxxxxxx>
> 
> Changes v1->v2:
> 
> 	- Rebased to v5.13-rc4
> 	- Add the check also to the kexec_file_load system call
> 
> Original cover letter:
> 
> Hi,
> 
> two small patches to disable kexec on x86 when running as an SEV-ES
> guest. Trying to kexec a new kernel would fail anyway because there is
> no mechanism yet to hand over the APs from the old to the new kernel.
> Supporting this needs changes in the Hypervisor and the guest kernel
> as well.
> 
> This code is currently being work on, but disable kexec in SEV-ES
> guests until it is ready.
> 
> Please review.
> 
> Regards,
> 
> 	Joerg
> 
> Joerg Roedel (2):
>   kexec: Allow architecture code to opt-out at runtime
>   x86/kexec/64: Forbid kexec when running as an SEV-ES guest
> 
>  arch/x86/kernel/machine_kexec_64.c |  8 ++++++++
>  include/linux/kexec.h              |  1 +
>  kernel/kexec.c                     | 14 ++++++++++++++
>  kernel/kexec_file.c                |  9 +++++++++
>  4 files changed, 32 insertions(+)
> 
> -- 
> 2.31.1



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux