TDX capable platforms are locked to X2APIC mode and cannot fall back to
the legacy xAPIC mode when TDX is enabled by the BIOS. TDX host support
requires x2APIC. Make INTEL_TDX_HOST depend on X86_X2APIC.
Link: https://lore.kernel.org/lkml/[email protected]/
Signed-off-by: Kai Huang <[email protected]>
Reviewed-by: Dave Hansen <[email protected]>
Reviewed-by: David Hildenbrand <[email protected]>
---
v10 -> v11:
- Added David's Reviewed-by.
v9 -> v10:
- No change.
v8 -> v9:
- Added Dave's Reviewed-by.
v7 -> v8: (Dave)
- Only make INTEL_TDX_HOST depend on X86_X2APIC but removed other code
- Rewrote the changelog.
v6 -> v7:
- Changed to use "Link" for the two lore links to get rid of checkpatch
warning.
---
arch/x86/Kconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index 191587f75810..f0f3f1a2c8e0 100644
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -1957,6 +1957,7 @@ config INTEL_TDX_HOST
depends on CPU_SUP_INTEL
depends on X86_64
depends on KVM_INTEL
+ depends on X86_X2APIC
help
Intel Trust Domain Extensions (TDX) protects guest VMs from malicious
host and certain physical attacks. This option enables necessary TDX
--
2.40.1
On Mon, Jun 05, 2023 at 02:27:16AM +1200, Kai Huang wrote:
> TDX capable platforms are locked to X2APIC mode and cannot fall back to
> the legacy xAPIC mode when TDX is enabled by the BIOS. TDX host support
> requires x2APIC. Make INTEL_TDX_HOST depend on X86_X2APIC.
>
> Link: https://lore.kernel.org/lkml/[email protected]/
> Signed-off-by: Kai Huang <[email protected]>
> Reviewed-by: Dave Hansen <[email protected]>
> Reviewed-by: David Hildenbrand <[email protected]>
Reviewed-by: Kirill A. Shutemov <[email protected]>
--
Kiryl Shutsemau / Kirill A. Shutemov