Re: [PATCH v2 0/2] x86: Disable kexec for SEV-ES guests

From: Joerg Roedel
Date: Mon Jun 14 2021 - 08:33:10 EST


Gentle ping.

On Thu, Jun 03, 2021 at 03:22:31PM +0200, Joerg Roedel wrote:
> From: Joerg Roedel <jroedel@xxxxxxx>
>
> Changes v1->v2:
>
> - Rebased to v5.13-rc4
> - Add the check also to the kexec_file_load system call
>
> Original cover letter:
>
> Hi,
>
> two small patches to disable kexec on x86 when running as an SEV-ES
> guest. Trying to kexec a new kernel would fail anyway because there is
> no mechanism yet to hand over the APs from the old to the new kernel.
> Supporting this needs changes in the Hypervisor and the guest kernel
> as well.
>
> This code is currently being work on, but disable kexec in SEV-ES
> guests until it is ready.
>
> Please review.
>
> Regards,
>
> Joerg
>
> Joerg Roedel (2):
> kexec: Allow architecture code to opt-out at runtime
> x86/kexec/64: Forbid kexec when running as an SEV-ES guest
>
> arch/x86/kernel/machine_kexec_64.c | 8 ++++++++
> include/linux/kexec.h | 1 +
> kernel/kexec.c | 14 ++++++++++++++
> kernel/kexec_file.c | 9 +++++++++
> 4 files changed, 32 insertions(+)
>
> --
> 2.31.1