Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp3054324rdg; Tue, 17 Oct 2023 03:16:50 -0700 (PDT) X-Google-Smtp-Source: AGHT+IE1orJeu/Zne2sQTAMPQqueea/8CLAJrR+ASfOC/RIX3n9GHw0WpCU+MDc/NV33pxyYZJkf X-Received: by 2002:a17:903:41c8:b0:1c9:b207:d412 with SMTP id u8-20020a17090341c800b001c9b207d412mr2516540ple.37.1697537809922; Tue, 17 Oct 2023 03:16:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697537809; cv=none; d=google.com; s=arc-20160816; b=FjYnixaxPLnVjbCiNbZjfIXZcN0sSsqUF+1gcTUeFMq5yKqa2pM43h1s4QcE/vIiSX 2kDgcspHmC9NAa0RDO1dlZInNLyKlucAAxcVCyQi008W+NBUp6Y5PyVHOxkRP7xJiHSS 2T60CK8/uSFm3XxDKYGm/xOO1Yap4vByX3zhWm/k01lNNrht68AllQtPun4Cov71o7Qe vkONZTsTKR3MwsGV4thqrsnpGku2Di0NPTgTMvm6ja38dCTcdo/7bmY9vXIPmB46cA5L oZsaa6JCW8qvfOAH0O3F46MznFTkgWZkfo3jUFpQXEKjZtI4o38ri2jVe8zXhlJ3/bPC dB8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=AFwXXwTltxlKbip0e8MQ4zvuOXzx1OUft/+3dVD/KO8=; fh=WBgbLtMencYhgeHuu2sUs5b9THiYLgy17d2w1N+xuf4=; b=DZ2nFERCmFuXGIpQ7exJItpkurr1x25243b7fSAJNNNWe+ItZKbWRyZQkblsna4YkD j3PaWqokNq3yqBM81xoQadVWdzOvlDjjOW20t9q4hj3GwySaT0gko73jNeN9WX+Raq5S Utu+/LV8B9MYihn4Jhrar3buHNIjAqP+gjHmccjjt+7c1pn+y6heR4CsgKJVSrXTMHC0 FP09sorFi4+TRDXIbvfJFbRGuo/QN+TUZjTGLqGgtQjz9Ri2hcyDcum06epOvQ1/+j9P VgduP0TPnZxBJZoirvOVc8zubmVm48zWvMfS9YpindMARXAXeG1EWiHrW+qVDCymlEOo EZUw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="Fjk+Ygx/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id 13-20020a170902c24d00b001a6f0eab385si368366plg.55.2023.10.17.03.16.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 Oct 2023 03:16:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="Fjk+Ygx/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 3B3B580781F3; Tue, 17 Oct 2023 03:15:57 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235008AbjJQKPi (ORCPT + 99 others); Tue, 17 Oct 2023 06:15:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32800 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234978AbjJQKPZ (ORCPT ); Tue, 17 Oct 2023 06:15:25 -0400 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1481110C; Tue, 17 Oct 2023 03:15:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1697537723; x=1729073723; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=M13wjUUNn+5qp3WHcPzQPPn/BLcPZthn3SrCaY2RDNA=; b=Fjk+Ygx/sYurk/wjeCAYcQR8CIib5ZGA3xt/qK5nKjf2olL4nRjcZ5Gc EQz3p9iG/Wqrd63PWRbvVe7H18SJWDsv+Btb/phsrLYTcK5JEN0mXbk4P yudgSrErmU9Ra5aPdtCihBQoKNueBHyq3bmd9dNFQedT8p6ReRNzf2ZJJ sRa0dJMucJLiSTIJaCDIk4CT8h/J1oBtZ891vD21nBqWVr8fXqRJLbDdo oBV/0qk+YowHWnNFuZ6BoxXuEaMahKjBa8kNdE6FkvsUjXJ/m6mW2GjiF UPQgcGI9mOQIfTBzXXnS+0U45+pRO3UC2R/qwjSxlsP3v4vwjVSjKYI6D g==; X-IronPort-AV: E=McAfee;i="6600,9927,10865"; a="452226726" X-IronPort-AV: E=Sophos;i="6.03,231,1694761200"; d="scan'208";a="452226726" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Oct 2023 03:15:22 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10865"; a="872503372" X-IronPort-AV: E=Sophos;i="6.03,231,1694761200"; d="scan'208";a="872503372" Received: from chowe-mobl.amr.corp.intel.com (HELO khuang2-desk.gar.corp.intel.com) ([10.255.229.64]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Oct 2023 03:15:16 -0700 From: Kai Huang To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: x86@kernel.org, dave.hansen@intel.com, kirill.shutemov@linux.intel.com, peterz@infradead.org, tony.luck@intel.com, tglx@linutronix.de, bp@alien8.de, mingo@redhat.com, hpa@zytor.com, seanjc@google.com, pbonzini@redhat.com, rafael@kernel.org, david@redhat.com, dan.j.williams@intel.com, len.brown@intel.com, ak@linux.intel.com, isaku.yamahata@intel.com, ying.huang@intel.com, chao.gao@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, nik.borisov@suse.com, bagasdotme@gmail.com, sagis@google.com, imammedo@redhat.com, kai.huang@intel.com Subject: [PATCH v14 03/23] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC Date: Tue, 17 Oct 2023 23:14:27 +1300 Message-ID: X-Mailer: git-send-email 2.41.0 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Tue, 17 Oct 2023 03:15:57 -0700 (PDT) TDX capable platforms are locked to X2APIC mode and cannot fall back to the legacy xAPIC mode when TDX is enabled by the BIOS. TDX host support requires x2APIC. Make INTEL_TDX_HOST depend on X86_X2APIC. Link: https://lore.kernel.org/lkml/ba80b303-31bf-d44a-b05d-5c0f83038798@intel.com/ Signed-off-by: Kai Huang Reviewed-by: Dave Hansen Reviewed-by: David Hildenbrand Reviewed-by: Kirill A. Shutemov --- arch/x86/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 3b3594f96330..a70f3f205969 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1944,6 +1944,7 @@ config INTEL_TDX_HOST depends on CPU_SUP_INTEL depends on X86_64 depends on KVM_INTEL + depends on X86_X2APIC help Intel Trust Domain Extensions (TDX) protects guest VMs from malicious host and certain physical attacks. This option enables necessary TDX -- 2.41.0