Lines Matching refs:kernel
39 Trusted Boot (tboot) is an open source, pre-kernel/VMM module that
41 kernel/VMM.
55 measure or protect the integrity of a running kernel, they all
56 assume the kernel is "good" to begin with. The Integrity
60 To get trust in the initial kernel without using Intel TXT, a
63 executed between system reset through the completion of the kernel
65 Linux kernel, this means all of BIOS, any option ROMs, the
91 the "kernel" (the binary the bootloader executes).
97 incorrect), it will directly launch the kernel with no changes
114 special code into the kernel's MP wakeup sequence.
116 verify the kernel and initrd.
121 then any kernel will be launched.
128 VT-d PMRs). Thus, the kernel must be booted with 'intel_iommu=on'
132 pass this to the Linux kernel as it transfers control.
135 o The kernel will look for the tboot shared page address and, if it
139 them for correctness. The VT-d code will detect if the kernel was
148 - The kernel will perform all of its sleep preparation and
151 - Then the kernel jumps into tboot via the vector specified in the
154 kernel-provided ACPI information to actually place the platform
160 transfer control back to the kernel's S3 resume vector.
161 In order to preserve system integrity across S3, the kernel
187 kernel /tboot.gz logging=serial,vga,memory
193 The kernel option for enabling Intel TXT support is found under the
197 kernel build options), since the tboot code will detect whether the
199 kernel code is executed.