On Tue, Aug 02, 2022 at 03:47:11PM +0800, Xiaoyao Li wrote: > Pull in recent TDX updates, which are not backwards compatible. > > It's just to make this series runnable. It will be updated by script > > scripts/update-linux-headers.sh > > once TDX support is upstreamed in linux kernel. I saw a bunch of TDX support merged in 5.19: commit 3a755ebcc2557e22b895b8976257f682c653db1d Merge: 5b828263b180 c796f02162e4 Author: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx> Date: Mon May 23 17:51:12 2022 -0700 Merge tag 'x86_tdx_for_v5.19_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip Pull Intel TDX support from Borislav Petkov: "Intel Trust Domain Extensions (TDX) support. This is the Intel version of a confidential computing solution called Trust Domain Extensions (TDX). This series adds support to run the kernel as part of a TDX guest. It provides similar guest protections to AMD's SEV-SNP like guest memory and register state encryption, memory integrity protection and a lot more. Design-wise, it differs from AMD's solution considerably: it uses a software module which runs in a special CPU mode called (Secure Arbitration Mode) SEAM. As the name suggests, this module serves as sort of an arbiter which the confidential guest calls for services it needs during its lifetime. Just like AMD's SNP set, this series reworks and streamlines certain parts of x86 arch code so that this feature can be properly accomodated" Is that sufficient for this patch, or is there more pending out of tree that QEMU still depends on ? With regards, Daniel -- |: https://berrange.com -o- https://www.flickr.com/photos/dberrange :| |: https://libvirt.org -o- https://fstop138.berrange.com :| |: https://entangle-photo.org -o- https://www.instagram.com/dberrange :|