From mboxrd@z Thu Jan 1 00:00:00 1970 From: Chris Wright Subject: Re: TPM Support in KVM Date: Tue, 26 Jan 2010 07:56:41 -0800 Message-ID: <20100126155641.GF13518@sequoia.sous-sol.org> References: <690347541001260447k7e35a71aie4a7611901059703@mail.gmail.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: kvm@vger.kernel.org To: Martin Schneider Return-path: Received: from sous-sol.org ([216.99.217.87]:46586 "EHLO sequoia.sous-sol.org" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753936Ab0AZP4r (ORCPT ); Tue, 26 Jan 2010 10:56:47 -0500 Content-Disposition: inline In-Reply-To: <690347541001260447k7e35a71aie4a7611901059703@mail.gmail.com> Sender: kvm-owner@vger.kernel.org List-ID: * Martin Schneider (martincschneider@googlemail.com) wrote: > Dear list, > > is there a document that describes the level of support of trusted > computing technology in KVM and how things work? There's host level trusted boot, which simply needs tboot and a new enough kernel to support CONFIG_TXT. > I read in various sources that KVM should support virtual Trusted > Platform Modules in virtual machines but I coudln't find any evidence > and/or document about this on the official site. No vTPM is currently supported. thanks, -chris