lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 16 Dec 2020 09:41:41 -0800 From: "Chang S. Bae" <chang.seok.bae@...el.com> To: tglx@...utronix.de, mingo@...nel.org, bp@...e.de, luto@...nel.org, x86@...nel.org, herbert@...dor.apana.org.au Cc: dan.j.williams@...el.com, dave.hansen@...el.com, ravi.v.shankar@...el.com, ning.sun@...el.com, kumar.n.dwarakanath@...el.com, linux-crypto@...r.kernel.org, linux-kernel@...r.kernel.org, chang.seok.bae@...el.com Subject: [RFC PATCH 3/8] x86/msr-index: Add MSRs for Key Locker internal key Key Locker internal key in a CPU state can be backed up in a platform register. The backup can be also copied back to a CPU state. This mechanism is useful to restore the key (after system sleep). Add MSRs for the internal key backup, copy, and status check. Signed-off-by: Chang S. Bae <chang.seok.bae@...el.com> Cc: x86@...nel.org Cc: linux-kernel@...r.kernel.org --- arch/x86/include/asm/msr-index.h | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/arch/x86/include/asm/msr-index.h b/arch/x86/include/asm/msr-index.h index 972a34d93505..c0b9157806f7 100644 --- a/arch/x86/include/asm/msr-index.h +++ b/arch/x86/include/asm/msr-index.h @@ -922,4 +922,10 @@ #define MSR_VM_IGNNE 0xc0010115 #define MSR_VM_HSAVE_PA 0xc0010117 +/* MSRs for Key Locker Internal (Wrapping) Key management */ +#define MSR_IA32_COPY_LOCAL_TO_PLATFORM 0x00000d91 +#define MSR_IA32_COPY_PLATFORM_TO_LOCAL 0x00000d92 +#define MSR_IA32_COPY_STATUS 0x00000990 +#define MSR_IA32_IWKEYBACKUP_STATUS 0x00000991 + #endif /* _ASM_X86_MSR_INDEX_H */ -- 2.17.1
Powered by blists - more mailing lists