Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp770510pxk; Thu, 24 Sep 2020 19:13:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwRTiPF3qREbfZAHWUCtl+a9jGYfJqoIvNOkJMQygHOLa54L05xey8hbh9oJS+tBs9FkDi/ X-Received: by 2002:a50:afc6:: with SMTP id h64mr1745244edd.10.1600999981752; Thu, 24 Sep 2020 19:13:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600999981; cv=none; d=google.com; s=arc-20160816; b=VRTL6oIjq4UiGk7PBrD+9KLpG+XmYvRh9m88IOf1lATUvSw0bEvEb5SY2Yf9IwWMFz YHhfHrt9SNGc7gkCRlpvAPDTyHPktdYdNevZXHfcdNK+r73X/ju7aXnFSPW8+3TX0RTp peweFF7Wy8WuZ30VbbCkmxkqGG81XFwxI7po0N4qNvCflWkunTTRKHXO3toR9CU0Njzf 6SaJb+8bzXFDbQ9ikxooBGsA/PLWP04xM3oqISRde0clLr3NAZP2P3s98Z0zi59/0zF8 OevxSHIzEnw49Pe421T6S64xFC/67ClO5N5+zN9UkKgxcAUqyvd8TztlaxZIToFOo+7G +Fcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=J1HkhvmRiGdIYDPIe3gIfcnRgqplrWsR6CykG4Adksc=; b=wLpQ167d3AoUDh7nHAUfhHoBTnix46MOB21Z5DO4w1OiTfIPZ/c2oVRD4ezsytfwo1 FSa4d5ay45GyURFFDQKDWBwQpBDPGUn7G+wK+CTE9LKwsSZkGP2iiqeh6V56PcgHZ2mh YdPbnIzmsc1GaYn8jb/fFqz5h16EFMdSKPwugEVrIhnJYRCsFpSP3ao89pUaaPVF3HLz pw3fG8EKpXRxE9V8Hg6kc9Fmi+YO5+T10wLL5CAXh7P4myI9t+42VTinF4gTTvqnKT3x rCv3aXZKrYXyrhMtvO20szJBje36TuMddwu+GDq8dYeu6+oIeToVFMQ80iUcsw5ZsRva ybCw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=d3mPvSTA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a3si855332eda.133.2020.09.24.19.12.38; Thu, 24 Sep 2020 19:13:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=d3mPvSTA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726837AbgIYCJR (ORCPT + 99 others); Thu, 24 Sep 2020 22:09:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52656 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726676AbgIYCJO (ORCPT ); Thu, 24 Sep 2020 22:09:14 -0400 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BFCD7C0613CE; Thu, 24 Sep 2020 19:09:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To:Subject:Sender :Reply-To:Content-ID:Content-Description; bh=J1HkhvmRiGdIYDPIe3gIfcnRgqplrWsR6CykG4Adksc=; b=d3mPvSTAi7fvnRqKXhBNzXRsaM ycQVuva54BLVbK8NHQsPGbesdSENi2vNdOYDP7qriVBwM7fPlJBdCB1WQwbvV9aqnC6X8CwfENqUI ieJlNmKP0M/Wj1c9l1Qe7yMbrE7FPagHqrAMjQKhpQFz41XyNFHGgZ7DPwya42caPAQW85dcd1R01 plRtlL70tAFBhEZjXD9Mh71wSV1Go22qBW4qV2r3+GYuNY5ddi6AaNXXcyWu7i0KYygdtAStMni56 FKh+7ev69YwgGHMkPqwI0rJpdgf8rbItRc8IdZWpiBx+Etv/c/VXkxTsOQVKPA420WiOXTQfXLdte UdgflFTw==; Received: from [2601:1c0:6280:3f0::19c2] by casper.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1kLdAS-00033Q-49; Fri, 25 Sep 2020 02:09:00 +0000 Subject: Re: [PATCH 01/13] x86: Secure Launch Kconfig To: Ross Philipson , linux-kernel@vger.kernel.org, x86@kernel.org, iommu@lists.linux-foundation.org, linux-integrity@vger.kernel.org, linux-doc@vger.kernel.org Cc: dpsmith@apertussolutions.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, luto@amacapital.net, trenchboot-devel@googlegroups.com References: <1600959521-24158-1-git-send-email-ross.philipson@oracle.com> <1600959521-24158-2-git-send-email-ross.philipson@oracle.com> From: Randy Dunlap Message-ID: <22ecb054-c340-cea7-7d80-28469fdcddc6@infradead.org> Date: Thu, 24 Sep 2020 19:08:53 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: <1600959521-24158-2-git-send-email-ross.philipson@oracle.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/24/20 7:58 AM, Ross Philipson wrote: > Initial bits to bring in Secure Launch functionality. Add Kconfig > options for compiling in/out the Secure Launch code. > > Signed-off-by: Ross Philipson Hi, from Documentation/process/coding-style.rst: Lines under a ``config`` definition are indented with one tab, while help text is indented an additional two spaces. > --- > arch/x86/Kconfig | 36 ++++++++++++++++++++++++++++++++++++ > 1 file changed, 36 insertions(+) > > diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig > index 7101ac6..8957981 100644 > --- a/arch/x86/Kconfig > +++ b/arch/x86/Kconfig > @@ -1968,6 +1968,42 @@ config EFI_MIXED > > If unsure, say N. > > +config SECURE_LAUNCH > + bool "Secure Launch support" > + default n > + depends on X86_64 > + help > + The Secure Launch feature allows a kernel to be loaded > + directly through an Intel TXT measured launch. Intel TXT > + establishes a Dynamic Root of Trust for Measurement (DRTM) > + where the CPU measures the kernel image. This feature then > + continues the measurement chain over kernel configuration > + information and init images. > + > +choice > + prompt "Select Secure Launch Algorithm for TPM2" > + depends on SECURE_LAUNCH > + > +config SECURE_LAUNCH_SHA1 > + bool "Secure Launch TPM1 SHA1" > + help > + When using Secure Launch and TPM1 is present, use SHA1 hash > + algorithm for measurements. > + > +config SECURE_LAUNCH_SHA256 > + bool "Secure Launch TPM2 SHA256" > + help > + When using Secure Launch and TPM2 is present, use SHA256 hash > + algorithm for measurements. > + > +config SECURE_LAUNCH_SHA512 > + bool "Secure Launch TPM2 SHA512" > + help > + When using Secure Launch and TPM2 is present, use SHA512 hash > + algorithm for measurements. > + > +endchoice > + thanks. -- ~Randy