Received: by 2002:ab2:b82:0:b0:1f3:401:3cfb with SMTP id 2csp825998lqh; Thu, 28 Mar 2024 19:13:38 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXKEeyrfWzTekcBTxNjjSAKGnrP242/6OrxUKgrt6v8guaJ/BYkuaEyJicAn6AgYu22pjRz1u7aQx/oiM52NuphqyQFuEspBuVI50yW3A== X-Google-Smtp-Source: AGHT+IF6+9L3oYY2YU19gCDJ5Jv/ZBQdaiBA9+jXdcI8iZjDsHK8gDJdy7QalIWkto/HWIsVvq2e X-Received: by 2002:a05:622a:4c9:b0:431:38cb:d7ae with SMTP id q9-20020a05622a04c900b0043138cbd7aemr882806qtx.67.1711678417962; Thu, 28 Mar 2024 19:13:37 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711678417; cv=pass; d=google.com; s=arc-20160816; b=w6D6AzCWsYOrz0mD3eFSGJ8c/OxtFheZpB8uVeTzint30oou1Kp2heR8sEgZcQRJQN qNcMmPmZErQu/yqDUa0ZdpWdFmNfm/9ZhhAu44kFnWH5E/aV1SI9qwJ83PSw8NRMV5ll tarivuNHKdkLtW8ZM/TN8DD3haiV2JBPxlWIcqcUzQ1K8X4R6uzqSkF7sNhKfftmGsmv /ZEuJCZHzlrAWVfy9/HpunU1M+c3/pu8Ww7Jppjd/+LhWhMT+qlJFn1dEEKHS52gqTT2 H5BJHKhgc5wbREyukvtj/+vygYZOa7W7jmHaSpm0BRO4AgdhGvMW8Zj8IE6zK8q94BjZ JhNA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=YhWP02yQG8TSBYjlOq6E0qXlDbp+hLFz5PL4iqBkUpM=; fh=fc02Wq75j88D1YwbFaqCEussXy8XsKMC224gTsgnOtk=; b=STZkBOLmf+RSZzLQ1tRJG/BbiqGFss0HiH67Yg3dLx2+iRhtH2wteW65ZPDLLYwEfd 5pwSk8Szk7uYvgg7At0yrj6KrNy+AZ/CKeEZNdqAb2vY++pCAPkP0n+XbKVlzBnru3hw UQooDkAGa00KQAOGtEqohEefwH2fTv85v7ejtHX98SO5fmeNRqRkhhFv5FoKlo9aG6Kq Q+BYWcjhNSqGRaiIfGwfVBNPBhl0s0fzfjxJ12GY/dFmxyjjwgqMUFp5CSGjm8HhEgwI 2zrYWcNQXs7dBUOSuTOPT2ss8kvI2fZt8lUwbpsOAx9povQhlwzhhhKV76MjDJPyR4Se Rhdw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="DvHL/maD"; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-crypto+bounces-3050-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-3050-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id u31-20020a05622a199f00b004313b42c1e8si2883876qtc.283.2024.03.28.19.13.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 28 Mar 2024 19:13:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto+bounces-3050-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="DvHL/maD"; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-crypto+bounces-3050-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-crypto+bounces-3050-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id AFECF1C2A3E4 for ; Fri, 29 Mar 2024 02:13:37 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2277A44C68; Fri, 29 Mar 2024 02:10:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="DvHL/maD" X-Original-To: linux-crypto@vger.kernel.org Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6D04A3F9CF; Fri, 29 Mar 2024 02:10:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.18 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711678201; cv=none; b=Tid+fYHLhnKEb8G5arpuoVAOXHHwbV4c9tjJCf7JgK5VFIIe8JsYXzmVOCGpLkAJE1tnAutIkrq2JhONGpqU201ir1Tvio+v59fcFf5zDBXZ7xkW6xKRVJzrsOysYfKpbJBgcm29c6fgADpC00p7qiwz2elP4Q4Ph2/7EYG4kG8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711678201; c=relaxed/simple; bh=aiMV3JLKvNdSNk+9oWcbdjK3Hl15dermhyqrKf1VLgg=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=Y86n8k0V3/llQXsp3mFb1NCC7w1ASo1t01g5U2YKsKe08gnI/l7+tZz0zdzItVbQb7c+eVNNpXs+ek2q9tZcl41gVdMrbbFQ5uPzeARPZX6NoQyM76DyeBJoWbfvtAOpEoufNCiXStgk/ZPwK5bADryZuz1K1ChHGkng70wI/3c= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=DvHL/maD; arc=none smtp.client-ip=192.198.163.18 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1711678200; x=1743214200; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=aiMV3JLKvNdSNk+9oWcbdjK3Hl15dermhyqrKf1VLgg=; b=DvHL/maDgm/EZ3rLOBOdSW4bX/B2lOnWkK60iqSm8rXSH+QTQ0K74DKx IChexcaB1nPej5IGvdbt+gpPWXEfh+p8Pikq/2ym0FzOzo5+uCvUKCXV8 3To9QSbmWpXwvfLp/LjiHUtffeTmc5V2s1ueXFe2mvLLYOZI4itze5ViC acEIa8KO6slBmDxCS/gO8aQPcLVegYhqOgmSs3HhPwdQADQNsLlmB67AV jP3VP8kRc3BHX+Lrw/ic9eRCN0bdkoeJXKOkuTmoxUVRRKLMqLRgGXYN0 dPnOay1U8ri82z4yjjqPJ/r/Z04ybgTevRINPsMzXqJ5K/fOv9wq6gt5O g==; X-CSE-ConnectionGUID: Tt4UX0zvQKefSWm704dOCg== X-CSE-MsgGUID: SyPsO9KXQi2u14yo97DYnQ== X-IronPort-AV: E=McAfee;i="6600,9927,11027"; a="6700127" X-IronPort-AV: E=Sophos;i="6.07,162,1708416000"; d="scan'208";a="6700127" Received: from orviesa006.jf.intel.com ([10.64.159.146]) by fmvoesa112.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Mar 2024 19:09:52 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,162,1708416000"; d="scan'208";a="17301427" Received: from chang-linux-3.sc.intel.com ([172.25.66.175]) by orviesa006.jf.intel.com with ESMTP; 28 Mar 2024 19:09:51 -0700 From: "Chang S. Bae" To: linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, dm-devel@redhat.com Cc: ebiggers@kernel.org, luto@kernel.org, dave.hansen@linux.intel.com, tglx@linutronix.de, bp@alien8.de, mingo@kernel.org, x86@kernel.org, herbert@gondor.apana.org.au, ardb@kernel.org, elliott@hpe.com, dan.j.williams@intel.com, bernie.keany@intel.com, charishma1.gairuboyina@intel.com, chang.seok.bae@intel.com Subject: [PATCH v9 12/14] x86/Kconfig: Add a configuration for Key Locker Date: Thu, 28 Mar 2024 18:53:44 -0700 Message-Id: <20240329015346.635933-13-chang.seok.bae@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20240329015346.635933-1-chang.seok.bae@intel.com> References: <20230603152227.12335-1-chang.seok.bae@intel.com> <20240329015346.635933-1-chang.seok.bae@intel.com> Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Add CONFIG_X86_KEYLOCKER to gate whether Key Locker is initialized at boot. The option is selected by the Key Locker cipher module CRYPTO_AES_KL (to be added in a later patch). Signed-off-by: Chang S. Bae Reviewed-by: Dan Williams Cc: Borislav Petkov --- Changes from v8: * Drop the "nokeylocker" option. (Borislav Petkov) Changes from v6: * Rebase on the upstream: commit a894a8a56b57 ("Documentation: kernel-parameters: sort all "no..." parameters") Changes from RFC v2: * Make the option selected by CRYPTO_AES_KL. (Dan Williams) * Massage the changelog and the config option description. --- arch/x86/Kconfig | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 39886bab943a..41eb88dcfb62 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1878,6 +1878,9 @@ config X86_INTEL_MEMORY_PROTECTION_KEYS If unsure, say y. +config X86_KEYLOCKER + bool + choice prompt "TSX enable mode" depends on CPU_SUP_INTEL -- 2.34.1