diff options
author | Joseph Cihula <joseph.cihula@intel.com> | 2009-06-30 22:30:59 -0400 |
---|---|---|
committer | H. Peter Anvin <hpa@zytor.com> | 2009-07-21 14:49:06 -0400 |
commit | 3162534069597e34dd0ac9eb711be8dc23835ae7 (patch) | |
tree | a8cddd3899917784ebac2cdf6c75d2c8b50d04af /security | |
parent | aea1f7964ae6cba5eb419a958956deb9016b3341 (diff) |
x86, intel_txt: Intel TXT boot support
This patch adds kernel configuration and boot support for Intel Trusted
Execution Technology (Intel TXT).
Intel's technology for safer computing, Intel Trusted Execution
Technology (Intel TXT), defines platform-level enhancements that
provide the building blocks for creating trusted platforms.
Intel TXT was formerly known by the code name LaGrande Technology (LT).
Intel TXT in Brief:
o Provides dynamic root of trust for measurement (DRTM)
o Data protection in case of improper shutdown
o Measurement and verification of launched environment
Intel TXT is part of the vPro(TM) brand and is also available some
non-vPro systems. It is currently available on desktop systems based on
the Q35, X38, Q45, and Q43 Express chipsets (e.g. Dell Optiplex 755, HP
dc7800, etc.) and mobile systems based on the GM45, PM45, and GS45
Express chipsets.
For more information, see http://www.intel.com/technology/security/.
This site also has a link to the Intel TXT MLE Developers Manual, which
has been updated for the new released platforms.
A much more complete description of how these patches support TXT, how to
configure a system for it, etc. is in the Documentation/intel_txt.txt file
in this patch.
This patch provides the TXT support routines for complete functionality,
documentation for TXT support and for the changes to the boot_params structure,
and boot detection of a TXT launch. Attempts to shutdown (reboot, Sx) the system
will result in platform resets; subsequent patches will support these shutdown modes
properly.
Documentation/intel_txt.txt | 210 +++++++++++++++++++++
Documentation/x86/zero-page.txt | 1
arch/x86/include/asm/bootparam.h | 3
arch/x86/include/asm/fixmap.h | 3
arch/x86/include/asm/tboot.h | 197 ++++++++++++++++++++
arch/x86/kernel/Makefile | 1
arch/x86/kernel/setup.c | 4
arch/x86/kernel/tboot.c | 379 +++++++++++++++++++++++++++++++++++++++
security/Kconfig | 30 +++
9 files changed, 827 insertions(+), 1 deletion(-)
Signed-off-by: Joseph Cihula <joseph.cihula@intel.com>
Signed-off-by: Shane Wang <shane.wang@intel.com>
Signed-off-by: Gang Wei <gang.wei@intel.com>
Signed-off-by: H. Peter Anvin <hpa@zytor.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/Kconfig | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/Kconfig b/security/Kconfig index d23c839038f0..edc7cbdc012a 100644 --- a/security/Kconfig +++ b/security/Kconfig | |||
@@ -113,6 +113,36 @@ config SECURITY_ROOTPLUG | |||
113 | 113 | ||
114 | If you are unsure how to answer this question, answer N. | 114 | If you are unsure how to answer this question, answer N. |
115 | 115 | ||
116 | config INTEL_TXT | ||
117 | bool "Enable Intel(R) Trusted Execution Technology (Intel(R) TXT)" | ||
118 | depends on EXPERIMENTAL && X86 && DMAR && ACPI | ||
119 | help | ||
120 | This option enables support for booting the kernel with the | ||
121 | Trusted Boot (tboot) module. This will utilize | ||
122 | Intel(R) Trusted Execution Technology to perform a measured launch | ||
123 | of the kernel. If the system does not support Intel(R) TXT, this | ||
124 | will have no effect. | ||
125 | |||
126 | Intel TXT will provide higher assurance of sysem configuration and | ||
127 | initial state as well as data reset protection. This is used to | ||
128 | create a robust initial kernel measurement and verification, which | ||
129 | helps to ensure that kernel security mechanisms are functioning | ||
130 | correctly. This level of protection requires a root of trust outside | ||
131 | of the kernel itself. | ||
132 | |||
133 | Intel TXT also helps solve real end user concerns about having | ||
134 | confidence that their hardware is running the VMM or kernel that | ||
135 | it was conigured with, especially since they may be responsible for | ||
136 | providing such assurances to VMs and services running on it. | ||
137 | |||
138 | See <http://www.intel.com/technology/security/> for more information | ||
139 | about Intel(R) TXT. | ||
140 | See <http://tboot.sourceforge.net> for more information about tboot. | ||
141 | See Documentation/intel_txt.txt for a description of how to enable | ||
142 | Intel TXT support in a kernel boot. | ||
143 | |||
144 | If you are unsure as to whether this is required, answer N. | ||
145 | |||
116 | source security/selinux/Kconfig | 146 | source security/selinux/Kconfig |
117 | source security/smack/Kconfig | 147 | source security/smack/Kconfig |
118 | source security/tomoyo/Kconfig | 148 | source security/tomoyo/Kconfig |