[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e4fdc23e-71ef-db02-b05e-5ae55c1fadb2@linux.intel.com>
Date: Mon, 26 Apr 2021 15:32:07 -0700
From: "Kuppuswamy, Sathyanarayanan"
<sathyanarayanan.kuppuswamy@...ux.intel.com>
To: Randy Dunlap <rdunlap@...radead.org>,
Peter Zijlstra <peterz@...radead.org>,
Andy Lutomirski <luto@...nel.org>,
Dave Hansen <dave.hansen@...el.com>,
Dan Williams <dan.j.williams@...el.com>,
Tony Luck <tony.luck@...el.com>
Cc: Andi Kleen <ak@...ux.intel.com>,
Kirill Shutemov <kirill.shutemov@...ux.intel.com>,
Kuppuswamy Sathyanarayanan <knsathya@...nel.org>,
Raj Ashok <ashok.raj@...el.com>,
Sean Christopherson <seanjc@...gle.com>,
linux-kernel@...r.kernel.org
Subject: Re: [RFC v2 02/32] x86/tdx: Introduce INTEL_TDX_GUEST config option
On 4/26/21 2:09 PM, Randy Dunlap wrote:
> On 4/26/21 11:01 AM, Kuppuswamy Sathyanarayanan wrote:
>> Add INTEL_TDX_GUEST config option to selectively compile
>> TDX guest support.
>>
>> Signed-off-by: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@...ux.intel.com>
>> Reviewed-by: Andi Kleen <ak@...ux.intel.com>
>> Reviewed-by: Tony Luck <tony.luck@...el.com>
>> ---
>> arch/x86/Kconfig | 15 +++++++++++++++
>> 1 file changed, 15 insertions(+)
>>
>> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
>> index 6b4b682af468..932e6d759ba7 100644
>> --- a/arch/x86/Kconfig
>> +++ b/arch/x86/Kconfig
>> @@ -875,6 +875,21 @@ config ACRN_GUEST
>> IOT with small footprint and real-time features. More details can be
>> found in https://projectacrn.org/.
>>
>> +config INTEL_TDX_GUEST
>> + bool "Intel Trusted Domain eXtensions Guest Support"
>> + depends on X86_64 && CPU_SUP_INTEL && PARAVIRT
>> + depends on SECURITY
>> + select PARAVIRT_XL
>> + select X86_X2APIC
>> + select SECURITY_LOCKDOWN_LSM
>> + help
>> + Provide support for running in a trusted domain on Intel processors
>> + equipped with Trusted Domain eXtenstions. TDX is an new Intel
>
> a new Intel
>
Good catch. I will fix it in next version.
>> + technology that extends VMX and Memory Encryption with a new kind of
>> + virtual machine guest called Trust Domain (TD). A TD is designed to
>> + run in a CPU mode that protects the confidentiality of TD memory
>> + contents and the TD’s CPU state from other software, including VMM.
>> +
>> endif #HYPERVISOR_GUEST
>>
>> source "arch/x86/Kconfig.cpu"
>>
>
>
--
Sathyanarayanan Kuppuswamy
Linux Kernel Developer
Powered by blists - more mailing lists