Skip to content

Commit 8080484

Browse files
kaihuanghansendc
authored andcommitted
x86/virt/tdx: Remove the !KEXEC_CORE dependency
During kexec it is now guaranteed that all dirty cachelines of TDX private memory are flushed before jumping to the new kernel. The TDX private memory from the old kernel will remain as TDX private memory in the new kernel, but it is OK because kernel read/write to TDX private memory will never cause machine check, except on the platforms with the TDX partial write erratum, which has already been handled. It is safe to allow kexec to work together with TDX now. Remove the !KEXEC_CORE dependency. Signed-off-by: Kai Huang <kai.huang@intel.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com> Reviewed-by: Rick Edgecombe <rick.p.edgecombe@intel.com> Tested-by: Farrah Chen <farrah.chen@intel.com> Link: https://lore.kernel.org/all/20250901160930.1785244-6-pbonzini%40redhat.com
1 parent b18651f commit 8080484

1 file changed

Lines changed: 0 additions & 1 deletion

File tree

arch/x86/Kconfig

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1896,7 +1896,6 @@ config INTEL_TDX_HOST
18961896
depends on X86_X2APIC
18971897
select ARCH_KEEP_MEMBLOCK
18981898
depends on CONTIG_ALLOC
1899-
depends on !KEXEC_CORE
19001899
depends on X86_MCE
19011900
help
19021901
Intel Trust Domain Extensions (TDX) protects guest VMs from malicious

0 commit comments

Comments
 (0)