2007-10-24 06:18:49 +04:00
|
|
|
The additional fields in struct boot_params as a part of 32-bit boot
|
|
|
|
protocol of kernel. These should be filled by bootloader or 16-bit
|
|
|
|
real-mode setup code of the kernel. References/settings to it mainly
|
|
|
|
are in:
|
2007-08-11 00:31:08 +04:00
|
|
|
|
2015-01-31 10:23:24 +03:00
|
|
|
arch/x86/include/uapi/asm/bootparam.h
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
|
2007-10-24 06:18:49 +04:00
|
|
|
Offset Proto Name Meaning
|
|
|
|
/Size
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-24 06:18:49 +04:00
|
|
|
000/040 ALL screen_info Text mode or frame buffer information
|
|
|
|
(struct screen_info)
|
|
|
|
040/014 ALL apm_bios_info APM BIOS information (struct apm_bios_info)
|
x86, intel_txt: Intel TXT boot support
This patch adds kernel configuration and boot support for Intel Trusted
Execution Technology (Intel TXT).
Intel's technology for safer computing, Intel Trusted Execution
Technology (Intel TXT), defines platform-level enhancements that
provide the building blocks for creating trusted platforms.
Intel TXT was formerly known by the code name LaGrande Technology (LT).
Intel TXT in Brief:
o Provides dynamic root of trust for measurement (DRTM)
o Data protection in case of improper shutdown
o Measurement and verification of launched environment
Intel TXT is part of the vPro(TM) brand and is also available some
non-vPro systems. It is currently available on desktop systems based on
the Q35, X38, Q45, and Q43 Express chipsets (e.g. Dell Optiplex 755, HP
dc7800, etc.) and mobile systems based on the GM45, PM45, and GS45
Express chipsets.
For more information, see http://www.intel.com/technology/security/.
This site also has a link to the Intel TXT MLE Developers Manual, which
has been updated for the new released platforms.
A much more complete description of how these patches support TXT, how to
configure a system for it, etc. is in the Documentation/intel_txt.txt file
in this patch.
This patch provides the TXT support routines for complete functionality,
documentation for TXT support and for the changes to the boot_params structure,
and boot detection of a TXT launch. Attempts to shutdown (reboot, Sx) the system
will result in platform resets; subsequent patches will support these shutdown modes
properly.
Documentation/intel_txt.txt | 210 +++++++++++++++++++++
Documentation/x86/zero-page.txt | 1
arch/x86/include/asm/bootparam.h | 3
arch/x86/include/asm/fixmap.h | 3
arch/x86/include/asm/tboot.h | 197 ++++++++++++++++++++
arch/x86/kernel/Makefile | 1
arch/x86/kernel/setup.c | 4
arch/x86/kernel/tboot.c | 379 +++++++++++++++++++++++++++++++++++++++
security/Kconfig | 30 +++
9 files changed, 827 insertions(+), 1 deletion(-)
Signed-off-by: Joseph Cihula <joseph.cihula@intel.com>
Signed-off-by: Shane Wang <shane.wang@intel.com>
Signed-off-by: Gang Wei <gang.wei@intel.com>
Signed-off-by: H. Peter Anvin <hpa@zytor.com>
2009-07-01 06:30:59 +04:00
|
|
|
058/008 ALL tboot_addr Physical address of tboot shared page
|
2007-10-24 06:18:49 +04:00
|
|
|
060/010 ALL ist_info Intel SpeedStep (IST) BIOS support information
|
|
|
|
(struct ist_info)
|
|
|
|
080/010 ALL hd0_info hd0 disk parameter, OBSOLETE!!
|
|
|
|
090/010 ALL hd1_info hd1 disk parameter, OBSOLETE!!
|
2015-07-20 19:23:50 +03:00
|
|
|
0A0/010 ALL sys_desc_table System description table (struct sys_desc_table),
|
|
|
|
OBSOLETE!!
|
2010-06-19 01:46:53 +04:00
|
|
|
0B0/010 ALL olpc_ofw_header OLPC's OpenFirmware CIF and friends
|
2013-01-27 22:43:28 +04:00
|
|
|
0C0/004 ALL ext_ramdisk_image ramdisk_image high 32bits
|
|
|
|
0C4/004 ALL ext_ramdisk_size ramdisk_size high 32bits
|
|
|
|
0C8/004 ALL ext_cmd_line_ptr cmd_line_ptr high 32bits
|
2007-10-24 06:18:49 +04:00
|
|
|
140/080 ALL edid_info Video mode setup (struct edid_info)
|
|
|
|
1C0/020 ALL efi_info EFI 32 information (struct efi_info)
|
|
|
|
1E0/004 ALL alk_mem_k Alternative mem check, in KB
|
|
|
|
1E4/004 ALL scratch Scratch field for the kernel setup code
|
2017-01-27 15:54:38 +03:00
|
|
|
1E8/001 ALL e820_entries Number of entries in e820_table (below)
|
2007-10-24 06:18:49 +04:00
|
|
|
1E9/001 ALL eddbuf_entries Number of entries in eddbuf (below)
|
|
|
|
1EA/001 ALL edd_mbr_sig_buf_entries Number of entries in edd_mbr_sig_buffer
|
|
|
|
(below)
|
2017-02-06 14:22:43 +03:00
|
|
|
1EB/001 ALL kbd_status Numlock is enabled
|
|
|
|
1EC/001 ALL secure_boot Secure boot is enabled in the firmware
|
2013-01-27 22:43:28 +04:00
|
|
|
1EF/001 ALL sentinel Used to detect broken bootloaders
|
2007-10-24 06:18:49 +04:00
|
|
|
290/040 ALL edd_mbr_sig_buffer EDD MBR signatures
|
2017-01-27 15:54:38 +03:00
|
|
|
2D0/A00 ALL e820_table E820 memory map table
|
2017-01-27 14:54:38 +03:00
|
|
|
(array of struct e820_entry)
|
2007-10-24 06:18:49 +04:00
|
|
|
D00/1EC ALL eddbuf EDD data (array of struct edd_info)
|