Reconfiguring a secure system
First Claim
Patent Images
1. A processor comprising:
- a plurality of cores; and
a configuration unit including;
a configuration storage to store configuration information;
a lock to lock the configuration storage;
a lock enable logic to enable the lock during secure system operation in response to a lock enable indicator of a lock enable control field being of a first state, wherein the lock enable logic cannot be reconfigured while the lock is enabled;
logic to determine whether an instruction that generates a configuration write transaction is from sub-operating mode code; and
a lock override logic to override the lock to enable a write to the configuration storage during the secure system operation if the instruction that generates the configuration write transaction is from the sub-operating mode code.
0 Assignments
0 Petitions
Accused Products
Abstract
Apparatuses, methods, and systems for reconfiguring a secure system are disclosed. In one embodiment, an apparatus includes a configuration storage location, a lock, and lock override logic. The configuration storage location is to store information to configure the apparatus. The lock is to prevent writes to the configuration storage location. The lock override logic is to allow instructions executed from sub-operating mode code to override the lock.
-
Citations
20 Claims
-
1. A processor comprising:
-
a plurality of cores; and a configuration unit including; a configuration storage to store configuration information; a lock to lock the configuration storage; a lock enable logic to enable the lock during secure system operation in response to a lock enable indicator of a lock enable control field being of a first state, wherein the lock enable logic cannot be reconfigured while the lock is enabled; logic to determine whether an instruction that generates a configuration write transaction is from sub-operating mode code; and a lock override logic to override the lock to enable a write to the configuration storage during the secure system operation if the instruction that generates the configuration write transaction is from the sub-operating mode code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
storing configuration information for a system in a configuration storage of a processor; enabling a lock with a lock enable logic of the processor to lock the configuration storage during secure system operation in response to a lock enable indicator being of a first state, wherein the lock enable logic cannot be reconfigured while the lock is enabled; determining whether an instruction that initiates a configuration write transaction is from sub-operating mode code; and overriding the lock to enable a write to the configuration storage during the secure system operation if the instruction is from the sub-operating mode code. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a processor including a plurality of cores and a configuration unit, the configuration unit including; a configuration storage to store information for the processor; a lock to lock the configuration storage; a lock enable logic including a lock enable field to store a lock enable indicator of a first state to enable the lock during secure system operation, wherein the lock enable logic cannot be reconfigured while the lock is enabled; logic to determine whether an instruction that generates a configuration write transaction is from sub-operating mode code; a lock override logic to override the lock if the logic determines that the instruction that generates the configuration write transaction is from the sub-operating mode code; and a dynamic random access memory to store the sub-operating mode code. - View Dependent Claims (17, 18, 19, 20)
-
Specification