Received: by 2002:a05:7412:1e0b:b0:fc:a2b0:25d7 with SMTP id kr11csp303819rdb; Wed, 14 Feb 2024 23:59:49 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCVIHutFQXcB6/tTsdXeO9NIAyKqwwtvR4oeK7fPuZqoJd0xd0M43c5cKZBeJS8O0IhSPCr8PA8nRzQ3XkZhIgD5Bi0Gz+xuHFSenK3UqA== X-Google-Smtp-Source: AGHT+IEjvbewtnLliMsNP33zDr8pIEx+1qulF1RCa/vVu7xoXybSf4UAba1z4yPvHDzon81OMijn X-Received: by 2002:a05:622a:489:b0:42d:a88f:1ce6 with SMTP id p9-20020a05622a048900b0042da88f1ce6mr1327790qtx.20.1707983989225; Wed, 14 Feb 2024 23:59:49 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707983989; cv=pass; d=google.com; s=arc-20160816; b=N7YhS7GzptviWHR6WEnEj613pPCSHHa/jByt+e1jsGUTmehsSFDYMT9Nvcmf4W6n8U NjOjbIxlRoYHA0oLoMT14WYDuGB0BYG4Ud2epXn5EAHYnngz9f8Ufi72e7sSbAOJUpXb 0R3fz8/F8CUNU0FzK35WHdtzpqjirghJAkkwLEmhI/gIxQP2wxgMzORljHFO9m48b1kr AKTbKOuMW5GZV0ozf32vhfTFCHh5O4g26DkauSnpSwxW1WmtX0EdG8/ihfK54B5dbKWH 0NYxJoAH3b9YyV1U7xkd+oYly9o1d8RzYYXe0b9cAw72URg2OgYlW07h4VgsDd7iMSJE 0F7w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :dkim-signature; bh=xUkEpyTMZZrUlP1vmL8HHG7nr0gktcny81h8AhR2sqQ=; fh=R08pxaLTxvUFF7W34lJ/XORDMPCUyZODJgFPfgegP0o=; b=wDmehO5WnGL5dmHeni335RWhO/z2nrhWeK5kFV7E+XeW3Fa73P6HinG+oOdTEIO1aW m+1ulgnQu5Dr6457i8uxCmIjDDyIK/+N5l200Nq5FRhmUVB9WaB/FuxqZTDSUOzGhp38 YQ1ku2uifCqS9YWntQEHOwl3VJ+c8351IgeKIFyUtiMQ7aPfehr1pvKPzOQsZwiCy7V8 sSz9gmJBRGlMlJdB+IZfkMJwv2iwv5mhzDU2AgjoQQCixPxLS8X6QFIy1GzSDyXSYcE7 kHz2nkFhP/0aTqiHWkP2Grmb0LAsZkNQLFzKQOgh3fJNfd6eae+kmv/dhNXJOqJsbDu0 T/pw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CEYad3Pe; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-crypto+bounces-2074-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-2074-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id c9-20020ac853c9000000b0042bb00c9584si780479qtq.506.2024.02.14.23.59.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 14 Feb 2024 23:59:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto+bounces-2074-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CEYad3Pe; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-crypto+bounces-2074-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-2074-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id F15571C216B7 for ; Thu, 15 Feb 2024 07:59:48 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AF074111BD; Thu, 15 Feb 2024 07:59:42 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="CEYad3Pe" X-Original-To: linux-crypto@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5C514BA37; Thu, 15 Feb 2024 07:59:42 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707983982; cv=none; b=d8p2UsGNkDZ6uLNt3oHjjy7fCRJT5OPXTYzEx+OogK5DmKjDmFHQgc3HaUw+mPOmnLAnS2e6fbI8yoWYxkQuVJS/Zm/ZwSGHDIGiaX/c9CipIqztlKj1oQuVxE0tPfq8XW3SjzjbA1wfcYF/wC/tM6ZHX3IX1aWIWdRrx0ucCNQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707983982; c=relaxed/simple; bh=lglMDlZkFJKsCIT7Fn8mnC0sShe/3fOaUD6KwdKeRb4=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=RQhNgzrklGP/12xfVrv9u38GY8aKAeZUIQjIpjV4x8YE+XwbF2kZ7wR3jMzQUxF35pI78v/tEEF+IULpLFMaHqp48RUQuMuOmYPYCFbQapZZlQOvLw4fhYyD0vR+JqCycrR2TpEnHZbTQOfJsCZVjZTM8BgIixIbqDEGLaPJ5is= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=CEYad3Pe; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id C0F6DC433A6; Thu, 15 Feb 2024 07:59:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1707983981; bh=lglMDlZkFJKsCIT7Fn8mnC0sShe/3fOaUD6KwdKeRb4=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=CEYad3Pec9rSmWPcYhdduNgmoa7KOhGjCI0MBxDg7AhPRC8sNL1DTZ/tqGc5Sb4/V nUYef9ls3xuZTT8BD2qUJZphInbwGWoKoejY0HkhKGoToxxzxy712koyGEOSkvQnKy CsfiJYgrfZGeLpwaHirxGD+uIirvYSDmo+Cc9elHJcXSTd6MC8nuduwJBbwdzF/rrM 9f4TbAphPqfEcpd3Unrvc72PbWm43zAscaXJQT4LPOV0Zk+S4Wr3CzErkLe8uTS31Q vLSVtVt2UZspkYhZju46AepuPzW8elm1OLcb07F8K/1rPKJm2sJEu9gMY8pSDl1UIa wJQX4cTjoJg4Q== Received: by mail-lj1-f171.google.com with SMTP id 38308e7fff4ca-2d180d6bd32so7178561fa.1; Wed, 14 Feb 2024 23:59:41 -0800 (PST) X-Forwarded-Encrypted: i=1; AJvYcCWXuGQg+Pli6Px0P+FSwOyoHd4HRSoSSnX8go6KH3pbWJzaGKKOY6hN5VMo5UcUBV4cOvqaz54nNDsn0ljkTU6kOnbiUI3JAffD0OKCo7M1NUVV9xwWBTR15vTMB9Po9tBcmIpm93O+u6WR86tNkXk7kMqOa8T/Z4x7oqmcQSMDcaUFD9Zn7wlb5OVyh7dQBWZurepw7AoLZEdqUB3YCxN+v2TZ X-Gm-Message-State: AOJu0YxAWSsQKTEHD702xTMeF6atQmItVV9wYuX0P5IqjDtmtNJFCqAN mXd3kZoiyu3JWZ754Y4AuoTl5ZYdJbEGqt2+CrcFVaogOtqKojUpk6XZ8jCwfvrCiGNj2CZfA6p n6E9UUT9mP+bBvwog66cFZuQ1z4o= X-Received: by 2002:a19:f70b:0:b0:512:55c8:da20 with SMTP id z11-20020a19f70b000000b0051255c8da20mr789212lfe.56.1707983979967; Wed, 14 Feb 2024 23:59:39 -0800 (PST) Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20240214221847.2066632-1-ross.philipson@oracle.com> <20240214221847.2066632-4-ross.philipson@oracle.com> In-Reply-To: <20240214221847.2066632-4-ross.philipson@oracle.com> From: Ard Biesheuvel Date: Thu, 15 Feb 2024 08:59:28 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v8 03/15] x86: Secure Launch Kconfig To: Ross Philipson Cc: linux-kernel@vger.kernel.org, x86@kernel.org, linux-integrity@vger.kernel.org, linux-doc@vger.kernel.org, linux-crypto@vger.kernel.org, kexec@lists.infradead.org, linux-efi@vger.kernel.org, dpsmith@apertussolutions.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, dave.hansen@linux.intel.com, mjg59@srcf.ucam.org, James.Bottomley@hansenpartnership.com, peterhuewe@gmx.de, jarkko@kernel.org, jgg@ziepe.ca, luto@amacapital.net, nivedita@alum.mit.edu, herbert@gondor.apana.org.au, davem@davemloft.net, kanth.ghatraju@oracle.com, trenchboot-devel@googlegroups.com Content-Type: text/plain; charset="UTF-8" On Wed, 14 Feb 2024 at 23:31, Ross Philipson wrote: > > Initial bits to bring in Secure Launch functionality. Add Kconfig > options for compiling in/out the Secure Launch code. > > Signed-off-by: Ross Philipson > --- > arch/x86/Kconfig | 12 ++++++++++++ > 1 file changed, 12 insertions(+) > > diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig > index 5edec175b9bf..d96d75f6f1a9 100644 > --- a/arch/x86/Kconfig > +++ b/arch/x86/Kconfig > @@ -2071,6 +2071,18 @@ config EFI_RUNTIME_MAP > > See also Documentation/ABI/testing/sysfs-firmware-efi-runtime-map. > > +config SECURE_LAUNCH > + bool "Secure Launch support" > + default n 'n' is already the default, so you can drop this line. > + depends on X86_64 && X86_X2APIC This depends on CONFIG_TCG_TPM as well (I got build failures without it) > + help > + The Secure Launch feature allows a kernel to be loaded > + directly through an Intel TXT measured launch. Intel TXT > + establishes a Dynamic Root of Trust for Measurement (DRTM) > + where the CPU measures the kernel image. This feature then > + continues the measurement chain over kernel configuration > + information and init images. > + > source "kernel/Kconfig.hz" > > config ARCH_SUPPORTS_KEXEC > -- > 2.39.3 >