From patchwork Tue Sep 26 04:17:03 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dan Williams X-Patchwork-Id: 144914 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:cae8:0:b0:403:3b70:6f57 with SMTP id r8csp1961907vqu; Tue, 26 Sep 2023 07:33:19 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFV7haVy8ig1vuSe7mIsXWnj/YUVnUITiPCzrrmuVF+EV3s07eZyZvteleA+CyNF9kRbjjE X-Received: by 2002:a17:902:e847:b0:1b6:bced:1dc2 with SMTP id t7-20020a170902e84700b001b6bced1dc2mr9791185plg.0.1695738799306; Tue, 26 Sep 2023 07:33:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695738799; cv=none; d=google.com; s=arc-20160816; b=S/PJVZRBAuKPtMh1LoE8f7Trm/Bq8xTXsQbfIFiHgzayeEYbnKTKd57hJkhiqWp8SN /pUNt/9t93in2V4fr+yhI6gyN3JjpCUSgltWoaZnsJUbsv9En9RiX5+uGCdKrbEFDKPi k7WjlJ7tVxtGsUgeYX8BFSIiixIbs7tPrTf53oZnfvF9ANruJmw8MbtR1NM+iAoMvps5 MOMxM6eHCXte28JEDld5wRh9e7yz40UujXaD2ClTCBDFIV/SxFpcysxN91XdPWuPcjDN xoL2C9Ep0Pe2H/aj2jTmkXWD0BBcLs/U77qWZYXhNtI9qZI40tb92MOgUxAN8i237vtz +Vpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:dkim-signature; bh=oA378HnFzyBGQ29r0bkQfzX1PmH1nxYOUiPv9CihgNE=; fh=1P1ByqBgV8dzCo6/pmhB8AtIvEGF4n5ubggLpPr81U4=; b=FLmriImsVmDg6qVlHpxCTavvRVBvzRO42HpmazIKa3rSGue3cV5LWpn9tbrzRDVK/8 ByFb5UC2HzEboJIjua5aMPFuFsreijJAUy4kGLOLoaA7RF+LSB1/WLdMB4W6m60kM2gl EDO4iwnRDm3NJ+o+BExQR/UmzWA3TjONkaaOu8FVBXui2UxnUJtOPxY/o5oAnex7Qhtj hLVSP6FQRT4ASvs5s0U1FuRWUQjyd5Z6ngFLxGpN6JDwZJF49P0X85JuqfXM/7WymZ6Y a+xKAZquSIw5UdxeBgjwAwLVuBjLEkrMptoVHO0B2g1YTJDGwjYWsw/8TOhSZIFMpmnD eaUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=XwY6W78S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id n14-20020a170903110e00b001bbcb3d9265si13373704plh.68.2023.09.26.07.33.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 26 Sep 2023 07:33:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=XwY6W78S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 01C358063011; Mon, 25 Sep 2023 21:18:05 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233201AbjIZERT (ORCPT + 27 others); Tue, 26 Sep 2023 00:17:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39970 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229472AbjIZERS (ORCPT ); Tue, 26 Sep 2023 00:17:18 -0400 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.88]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D6C05BF for ; Mon, 25 Sep 2023 21:17:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1695701831; x=1727237831; h=subject:from:to:cc:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=b7vp5OcVBoNhgN64VhsxskMsEKIzR4SqcCbOS2xbSV8=; b=XwY6W78SJ/KIXmy2wY2I6K8uumqVsu9GFo+epbHRNLz80UIYzqBWEIWD 6RvvrhTEjkE2r86IglipAkqEe3HJj6SLJS/iSdkWEtj3mBRRyk4MwhTlQ qg9m4taKBFAY9TIhubUtLJxgoXLMWwpxYb5jLc6UK7yGUTeiz9SEqkn6T qEMOnUHcdW/nlWfrsEqQxL+Akvst6ldaOHs+9xE6XRmzszs9DZPEXEzIY JGrZsCXaR4IVJ6Iv5bYxSArt9ThQaRln8l2xUcrHH4J6IC5wv5+cVQiyU yRCKQA7x59T3IST5umeCUoj2JDgQyOkEJGoLhuICQRE7TN/9b6ywsxbtG A==; X-IronPort-AV: E=McAfee;i="6600,9927,10843"; a="412395794" X-IronPort-AV: E=Sophos;i="6.03,177,1694761200"; d="scan'208";a="412395794" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Sep 2023 21:17:05 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10843"; a="814314514" X-IronPort-AV: E=Sophos;i="6.03,177,1694761200"; d="scan'208";a="814314514" Received: from fvivekku-mobl.amr.corp.intel.com (HELO dwillia2-xfh.jf.intel.com) ([10.251.18.72]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Sep 2023 21:17:04 -0700 Subject: [PATCH v4 1/6] virt: coco: Add a coco/Makefile and coco/Kconfig From: Dan Williams To: linux-coco@lists.linux.dev Cc: Kuppuswamy Sathyanarayanan , peterz@infradead.org, linux-kernel@vger.kernel.org, x86@kernel.org, dave.hansen@linux.intel.com Date: Mon, 25 Sep 2023 21:17:03 -0700 Message-ID: <169570182376.596431.13665321099443794459.stgit@dwillia2-xfh.jf.intel.com> In-Reply-To: <169570181657.596431.6178773442587231200.stgit@dwillia2-xfh.jf.intel.com> References: <169570181657.596431.6178773442587231200.stgit@dwillia2-xfh.jf.intel.com> User-Agent: StGit/0.18-3-g996c MIME-Version: 1.0 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Mon, 25 Sep 2023 21:18:05 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1778111007297525262 X-GMAIL-MSGID: 1778111007297525262 In preparation for adding another coco build target, relieve drivers/virt/Makefile of the responsibility to track new compilation unit additions to drivers/virt/coco/, and do the same for drivers/virt/Kconfig. Reviewed-by: Kuppuswamy Sathyanarayanan Signed-off-by: Dan Williams --- drivers/virt/Kconfig | 6 +----- drivers/virt/Makefile | 4 +--- drivers/virt/coco/Kconfig | 9 +++++++++ drivers/virt/coco/Makefile | 7 +++++++ 4 files changed, 18 insertions(+), 8 deletions(-) create mode 100644 drivers/virt/coco/Kconfig create mode 100644 drivers/virt/coco/Makefile diff --git a/drivers/virt/Kconfig b/drivers/virt/Kconfig index f79ab13a5c28..40129b6f0eca 100644 --- a/drivers/virt/Kconfig +++ b/drivers/virt/Kconfig @@ -48,10 +48,6 @@ source "drivers/virt/nitro_enclaves/Kconfig" source "drivers/virt/acrn/Kconfig" -source "drivers/virt/coco/efi_secret/Kconfig" - -source "drivers/virt/coco/sev-guest/Kconfig" - -source "drivers/virt/coco/tdx-guest/Kconfig" +source "drivers/virt/coco/Kconfig" endif diff --git a/drivers/virt/Makefile b/drivers/virt/Makefile index e9aa6fc96fab..f29901bd7820 100644 --- a/drivers/virt/Makefile +++ b/drivers/virt/Makefile @@ -9,6 +9,4 @@ obj-y += vboxguest/ obj-$(CONFIG_NITRO_ENCLAVES) += nitro_enclaves/ obj-$(CONFIG_ACRN_HSM) += acrn/ -obj-$(CONFIG_EFI_SECRET) += coco/efi_secret/ -obj-$(CONFIG_SEV_GUEST) += coco/sev-guest/ -obj-$(CONFIG_INTEL_TDX_GUEST) += coco/tdx-guest/ +obj-y += coco/ diff --git a/drivers/virt/coco/Kconfig b/drivers/virt/coco/Kconfig new file mode 100644 index 000000000000..fc5c64f04c4a --- /dev/null +++ b/drivers/virt/coco/Kconfig @@ -0,0 +1,9 @@ +# SPDX-License-Identifier: GPL-2.0-only +# +# Confidential computing related collateral +# +source "drivers/virt/coco/efi_secret/Kconfig" + +source "drivers/virt/coco/sev-guest/Kconfig" + +source "drivers/virt/coco/tdx-guest/Kconfig" diff --git a/drivers/virt/coco/Makefile b/drivers/virt/coco/Makefile new file mode 100644 index 000000000000..55302ef719ad --- /dev/null +++ b/drivers/virt/coco/Makefile @@ -0,0 +1,7 @@ +# SPDX-License-Identifier: GPL-2.0-only +# +# Confidential computing related collateral +# +obj-$(CONFIG_EFI_SECRET) += efi_secret/ +obj-$(CONFIG_SEV_GUEST) += sev-guest/ +obj-$(CONFIG_INTEL_TDX_GUEST) += tdx-guest/