Message ID | e64f3850b786f4651a3c51d5a925ad8ef765bdb6.1697532085.git.kai.huang@intel.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show
Return-Path: <kvm-owner@vger.kernel.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 620D6CDB474 for <kvm@archiver.kernel.org>; Tue, 17 Oct 2023 10:15:39 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235009AbjJQKPi (ORCPT <rfc822;kvm@archiver.kernel.org>); Tue, 17 Oct 2023 06:15:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32800 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234978AbjJQKPZ (ORCPT <rfc822;kvm@vger.kernel.org>); Tue, 17 Oct 2023 06:15:25 -0400 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1481110C; Tue, 17 Oct 2023 03:15:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1697537723; x=1729073723; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=M13wjUUNn+5qp3WHcPzQPPn/BLcPZthn3SrCaY2RDNA=; b=Fjk+Ygx/sYurk/wjeCAYcQR8CIib5ZGA3xt/qK5nKjf2olL4nRjcZ5Gc EQz3p9iG/Wqrd63PWRbvVe7H18SJWDsv+Btb/phsrLYTcK5JEN0mXbk4P yudgSrErmU9Ra5aPdtCihBQoKNueBHyq3bmd9dNFQedT8p6ReRNzf2ZJJ sRa0dJMucJLiSTIJaCDIk4CT8h/J1oBtZ891vD21nBqWVr8fXqRJLbDdo oBV/0qk+YowHWnNFuZ6BoxXuEaMahKjBa8kNdE6FkvsUjXJ/m6mW2GjiF UPQgcGI9mOQIfTBzXXnS+0U45+pRO3UC2R/qwjSxlsP3v4vwjVSjKYI6D g==; X-IronPort-AV: E=McAfee;i="6600,9927,10865"; a="452226726" X-IronPort-AV: E=Sophos;i="6.03,231,1694761200"; d="scan'208";a="452226726" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Oct 2023 03:15:22 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10865"; a="872503372" X-IronPort-AV: E=Sophos;i="6.03,231,1694761200"; d="scan'208";a="872503372" Received: from chowe-mobl.amr.corp.intel.com (HELO khuang2-desk.gar.corp.intel.com) ([10.255.229.64]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Oct 2023 03:15:16 -0700 From: Kai Huang <kai.huang@intel.com> To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: x86@kernel.org, dave.hansen@intel.com, kirill.shutemov@linux.intel.com, peterz@infradead.org, tony.luck@intel.com, tglx@linutronix.de, bp@alien8.de, mingo@redhat.com, hpa@zytor.com, seanjc@google.com, pbonzini@redhat.com, rafael@kernel.org, david@redhat.com, dan.j.williams@intel.com, len.brown@intel.com, ak@linux.intel.com, isaku.yamahata@intel.com, ying.huang@intel.com, chao.gao@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, nik.borisov@suse.com, bagasdotme@gmail.com, sagis@google.com, imammedo@redhat.com, kai.huang@intel.com Subject: [PATCH v14 03/23] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC Date: Tue, 17 Oct 2023 23:14:27 +1300 Message-ID: <e64f3850b786f4651a3c51d5a925ad8ef765bdb6.1697532085.git.kai.huang@intel.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <cover.1697532085.git.kai.huang@intel.com> References: <cover.1697532085.git.kai.huang@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: <kvm.vger.kernel.org> X-Mailing-List: kvm@vger.kernel.org |
Series |
TDX host kernel support
|
expand
|
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 3b3594f96330..a70f3f205969 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1944,6 +1944,7 @@ config INTEL_TDX_HOST depends on CPU_SUP_INTEL depends on X86_64 depends on KVM_INTEL + depends on X86_X2APIC help Intel Trust Domain Extensions (TDX) protects guest VMs from malicious host and certain physical attacks. This option enables necessary TDX