mirror of
https://git.proxmox.com/git/fwupd
synced 2025-06-11 04:28:02 +00:00
![]() This method does not indicate whether the kernel has enabled encryption. That information is only visible from the kernel log at this time. Continue to read the MSRs though, because if/when we get a method for the kernel to export it we may use these as a basis of "support" but not a indication of it being enabled. encrypted: ```FuPluginMsr SME/SEV check MSR: eax 01000f, ebx 016f FuPluginMsr PCI_MSR_AMD64_SYSCFG: 0f40000, sme_is_enabled=1 FuPluginMsr PCI_MSR_AMD64_SEV: 00, sev_is_enabled=0 ``` not_encrypted: ``` FuPluginMsr SME/SEV check MSR: eax 01000f, ebx 016f FuPluginMsr PCI_MSR_AMD64_SYSCFG: 0f40000, sme_is_enabled=1 FuPluginMsr PCI_MSR_AMD64_SEV: 00, sev_is_enabled=0 ``` |
||
---|---|---|
.. | ||
fu-plugin-msr.c | ||
fwupd-msr.conf | ||
meson.build | ||
msr.quirk | ||
README.md |
MSR
Introduction
This plugin checks if the Model-specific registers (MSRs) indicate the Direct Connect Interface (DCI) is enabled.
DCI allows debugging of Intel processors using the USB3 port. DCI should always be disabled and locked on production hardware as it allows the attacker to disable other firmware protection methods.
The result will be stored in a security attribute for HSI.
External Interface Access
This plugin requires read access to /sys/class/msr
.