lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 12 Jul 2022 13:39:06 +1200
From:   Kai Huang <kai.huang@...el.com>
To:     Sean Christopherson <seanjc@...gle.com>
Cc:     Martin Fernandez <martin.fernandez@...ypsium.com>,
        linux-kernel@...r.kernel.org, bp@...en8.de,
        dave.hansen@...ux.intel.com, x86@...nel.org, mingo@...hat.com,
        tglx@...utronix.de, kirill.shutemov@...ux.intel.com,
        daniel.gutson@...ypsium.com, hughsient@...il.com,
        alex.bazhaniuk@...ypsium.com
Subject: Re: [PATCH v2] x86/cpuinfo: Clear X86_FEATURE_TME if TME/MKTME is
 disabled by BIOS


> 
> > This patch basically tries to fix the issue that TME flag isn't cleared when TME
> > is disabled by BIOS.  And fir this purpose, the code change in this patch looks
> > reasonable to me.  Unless I am mistaken, detect_tme() will be called for all
> > cpus if TME is supported in CPUID but isn't enabled by BIOS (either LOCKED or
> > ENABLED bit isn't set).
> 
> But this patch doesn't handle the bypass bit, which _does_ effectively disable
> TME when set.  E.g. the MKTME spec says:
> 
>  Software must inspect the Hardware Encryption Enable (bit 1) and TME Encryption
>  Bypass Enable (bit 31) to determine if TME encryption is enabled.

Yeah so my original reply said:

"But perhaps it's arguable whether we can also clear TME flag in this case."

And I only gave my Acked-by.

It completely depends on the purpose of this patch, or what does this patch
claim to do.  If it only claims to clear TME bit if BIOS doesn't enable it, then
looks fine to me.  If it wants to achieve "clear TME feature flag if encryption
isn't active", then yes you are right.  

But as I said perhaps "whether we should clear TME flag when bypass is enabled"
is arguable.  After all, what does TME flag in /proc/cpuinfo imply?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ