Message ID | 20250421162712.77452-3-ross.philipson@oracle.com |
---|---|
State | New |
Headers | show |
Series | x86: Trenchboot secure dynamic launch Linux kernel support | expand |
On 4/21/25 10:41 AM, Randy Dunlap wrote: > Hi, > > On 4/21/25 9:26 AM, Ross Philipson wrote: >> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig >> index 4b9f378e05f6..badde1e9742e 100644 >> --- a/arch/x86/Kconfig >> +++ b/arch/x86/Kconfig >> @@ -2001,6 +2001,17 @@ config EFI_RUNTIME_MAP >> >> See also Documentation/ABI/testing/sysfs-firmware-efi-runtime-map. >> >> +config SECURE_LAUNCH >> + bool "Secure Launch support" >> + depends on X86_64 && X86_X2APIC && TCG_TIS && TCG_CRB && CRYPTO_LIB_SHA1 && CRYPTO_LIB_SHA256 > > It's normal to select needed library symbols instead of depending on them. > Nothing else in the kernel tree uses depends on for these 2 Kconfig symbols. > (CRYPTO_LIB_SHAxxx) Yes good point, we will address this. Ross > >> + help >> + The Secure Launch feature allows a kernel to be loaded >> + directly through an Intel TXT measured launch. Intel TXT >> + establishes a Dynamic Root of Trust for Measurement (DRTM) >> + where the CPU measures the kernel image. This feature then >> + continues the measurement chain over kernel configuration >> + information and init images. >
On 21-Apr-25 6:26 PM, Ross Philipson wrote: > Initial bits to bring in Secure Launch functionality. Add Kconfig > options for compiling in/out the Secure Launch code. > > Signed-off-by: Ross Philipson <ross.philipson@oracle.com> Acked-by: Mateusz Mowka <mateusz.mowka@linux.intel.com> > --- > arch/x86/Kconfig | 11 +++++++++++ > 1 file changed, 11 insertions(+) > > diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig > index 4b9f378e05f6..badde1e9742e 100644 > --- a/arch/x86/Kconfig > +++ b/arch/x86/Kconfig > @@ -2001,6 +2001,17 @@ config EFI_RUNTIME_MAP > > See also Documentation/ABI/testing/sysfs-firmware-efi-runtime-map. > > +config SECURE_LAUNCH > + bool "Secure Launch support" > + depends on X86_64 && X86_X2APIC && TCG_TIS && TCG_CRB && CRYPTO_LIB_SHA1 && CRYPTO_LIB_SHA256 > + help > + The Secure Launch feature allows a kernel to be loaded > + directly through an Intel TXT measured launch. Intel TXT > + establishes a Dynamic Root of Trust for Measurement (DRTM) > + where the CPU measures the kernel image. This feature then > + continues the measurement chain over kernel configuration > + information and init images. > + > source "kernel/Kconfig.hz" > > config ARCH_SUPPORTS_KEXEC
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 4b9f378e05f6..badde1e9742e 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -2001,6 +2001,17 @@ config EFI_RUNTIME_MAP See also Documentation/ABI/testing/sysfs-firmware-efi-runtime-map. +config SECURE_LAUNCH + bool "Secure Launch support" + depends on X86_64 && X86_X2APIC && TCG_TIS && TCG_CRB && CRYPTO_LIB_SHA1 && CRYPTO_LIB_SHA256 + help + The Secure Launch feature allows a kernel to be loaded + directly through an Intel TXT measured launch. Intel TXT + establishes a Dynamic Root of Trust for Measurement (DRTM) + where the CPU measures the kernel image. This feature then + continues the measurement chain over kernel configuration + information and init images. + source "kernel/Kconfig.hz" config ARCH_SUPPORTS_KEXEC
Initial bits to bring in Secure Launch functionality. Add Kconfig options for compiling in/out the Secure Launch code. Signed-off-by: Ross Philipson <ross.philipson@oracle.com> --- arch/x86/Kconfig | 11 +++++++++++ 1 file changed, 11 insertions(+)