[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xense-devel] [PATCH] Intel(R) Trusted Execution Technology support



Attached is a patch that adds Intel(R) Trusted Execution Technology
(Intel(R) TXT) support to Xen.  Intel(R) TXT was formerly known by the
codename LaGrande Technology (LT).

This version of the patch adds new functionality and re-structuring to
the previous version (which was posted in Aug.).

Intel(R) TXT in Brief:
----------------------
o  Provides dynamic root of trust for measurement (DRTM)
o  DMA protection (on SDV3/TEP platforms only)
o  Data protection in case of improper shutdown
o  Verification and enforcement of launched environment

For more information, see http://www.intel.com/technology/security/.
This site also has a link to the Intel(R) TXT Preliminary Architecture
Specification, which has been updated for the new released platforms.


Patch Overview:
--------------
The bulk of the TXT code is now hosted at its own SourceForge site,
http://sourceforge.net/projects/tboot.  This project hosts the code in a
mercurial repo at http://tboot.sourceforge.net/hg/tboot.hg and contains
tarballs of the source.  This site is still very new, so please forgive
its incompleteness.  Questions on just tboot should be sent to
tboot-devel@xxxxxxxxxxxxxxxxxxxxx or posted to the tboot project forum.

This patch is now only the Xen changes necessary to integrate with
tboot.  The top-level Makefile will 'wget' the tboot source tarball from
SourceForge, untar it, and then build.  Per feedback on the previous
patch, the changes are no longer built conditionally (but the code is
only executed if a measured launch was performed).  This patch applies
cleanly against c/s 16157:b28ae5f00553.

In addition to this re-structuring, the following additional
functionality has been added:
o  Support for S3/S4/S5
o  Verified Launch.  Tboot will extend verification from the MLE
(itself, as verified by TXT LCP) to the Xen and dom0, using policies
similar to the LCP and also stored in TPM NV.  These policies can be
created and managed by the tb_polgen tool and provisioned into TPM NV
using the lcptools.

There is more information about the functionality within the tboot/docs
files as well as configuration information and policy instructions.  The
documentation will be improved and flushed out over time so please
excuse its current spartan form.


Instructions for Use:
---------------------
o  The new tboot module must be added as the 'kernel' in the grub.conf
file.  The existing 'kernel' entry should follow as a 'module'.  The
SINIT AC module (available with systems that support TXT) must be added
to the grub.conf boot config as the last module, e.g.:
       title Xen 3.1.0 w/ Intel(R) Trusted Execution Technology
           root (hd0,1)
           kernel /tboot.gz
           module /xen.gz no-real-mode dom0_mem=524288 com1=115200,8n1
           module /vmlinuz-2.6.18-xen root=/dev/VolGroup00/LogVol00 ro
           module /initrd-2.6.18-xen.img
           module /BRLK_SINIT_20070910_release.BIN

o  Xen's command line must include the 'no-real-mode' option to prevent
Xen from reading the e820 table from BIOS.  The TXT code makes
modifications to the table passed via GRUB that the Xen portions of the
code need.

o  Progress of the launch process is indicated via debug printk's to
COM1 (hardcoded).  These appear before the normal "(XEN)" output and are
prefixed by "TBOOT:".  Though tboot does initialize the COM port, it is
best if this is also done by GRUB - grub.conf should have:
       serial --speed=115200 --unit=0
       terminal console serial

Attachment: txt-xen-1026.patch
Description: txt-xen-1026.patch

_______________________________________________
Xense-devel mailing list
Xense-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xense-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.