Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1839114pxb; Thu, 28 Oct 2021 10:59:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxjfFGpxPDC12VTQKv7nz5p35YpSXnaOzKDd4Dx4iQ/2GmlxjgSJeD9PHvJPsCAjNr2dWJv X-Received: by 2002:a17:90a:740d:: with SMTP id a13mr6243797pjg.113.1635443955742; Thu, 28 Oct 2021 10:59:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635443955; cv=none; d=google.com; s=arc-20160816; b=C5TBsyvFrcjVyxqWLnADImIWtHn5RbkdrLLyqKi3uUVR/a1PdLYXiPLFdLdy1CNdMU o+8wKnHxXDA3ZxClZT6iT81yyPdjKyyH2rmclW2IP8T3XIKGvO7OGJ+hA/vBdiPy7BMe TIrTNZoT1zkXYkQiEP7wp1CjWSQ+JfXCIaw2lulYmCW/kF4vmM15iKSy4Wj4OarbWw9k TYyoZZ9Xv31y4d1p/PwVSakB61V7klpJ7vjNloNx/6mk+7hp3i3/ttgMsw4UGWk2ZgZd tF3k/viOywgCIH33EqV4r7C7X0HYGi8wRPt02yb4E3rtt5JYifq3qhqAC7Pjz86zjh9D owew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :dkim-signature; bh=dGW8Vt2et+rcne6KwVtymqYHCSGlZ53wYldu0Tzg1PY=; b=Hu+7qNkfRoC+NHb12FxmksrF2YfhTD+or7ZjME0OHxqAPejpZsIDAMS96vgVvMXotJ crzxLNiatVkRM+/MfQpN0fCyhu9cLnwxzpkDuSSftJWV+kmqKyCh60yB/FYLEqVOuMpO zgzLzke0PnO/rTE88ZTNwrK3hEdPzQhg0uOAfI+FlA5neTsvXijbXMGsMm3EC1QZgWVz 2ThgGw2SE/UcnNXQCkBW/6Z3iaZzaAYO0iGoCLumogGejYOqOv8pfd0nPXdfick7hwra gqYPRxHrG+czopOCD0X5jgJRr+P46hAqUpnRMOYAUlD+ASfYoi2j2/39QD0YnR+mTVPq mblA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=E41H1VqP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ng18si10897493pjb.60.2021.10.28.10.59.01; Thu, 28 Oct 2021 10:59:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=E41H1VqP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231132AbhJ1SAa (ORCPT + 99 others); Thu, 28 Oct 2021 14:00:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51630 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230397AbhJ1SAW (ORCPT ); Thu, 28 Oct 2021 14:00:22 -0400 Received: from mail-pf1-x44a.google.com (mail-pf1-x44a.google.com [IPv6:2607:f8b0:4864:20::44a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6C841C061570 for ; Thu, 28 Oct 2021 10:57:55 -0700 (PDT) Received: by mail-pf1-x44a.google.com with SMTP id 4-20020a621604000000b0047bce81cc51so3682774pfw.20 for ; Thu, 28 Oct 2021 10:57:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:message-id:mime-version:subject:from:to:cc; bh=dGW8Vt2et+rcne6KwVtymqYHCSGlZ53wYldu0Tzg1PY=; b=E41H1VqPdFGwysh2xLCK9BkUQkic8v8Lvz4Hl6GuDateDJxDJJuneXXzgVz0Qm2yIh zgbULIiCiVB5zXuQFDJ+2T8qjFuevalztleL3TBfiUA+w9p2wl+v7A21ox/tqu13Y4Si KU/cUmsSbyBHMwhlbEv8wzhoPW9d2fsor4lsgWoSduvmKNWwf41/WscVWc+rOQomhLNR bYUZin8CpQahy6JIwBAemeXeZ1VEJH9+9EoTqH6jfA4xGEDO0QqQBuJE9yAAJ4kxD1ke TytSg3m82JkgPVOhREYb89fnbfD05rlrY7g68/pyCxyKG/iRpl9Zeq7ijcBPVbIf0s+K Aydw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=dGW8Vt2et+rcne6KwVtymqYHCSGlZ53wYldu0Tzg1PY=; b=Scwq1ub1Ii/ikEVZsyB1ZoV7ulWmH5FxXJovvQFbPSycJCY3i1+vlSv09r+8r3SThF HomnS/PzjYzzoFWQDfP4iiQsHA5xdhOwxv2pa2Ju7QZne0ngqGkTt1M4J8rZ3cfRWHko N8rOUQlnTezYylVRDZKpGwZEvZfpwvGFVGb1m/uKTQ8Cyzl6zG+UQue2T9e1GwMjBHJk wjdWOZ8sfIlhmj0w842BJdigCYHC3jxqZtYC+7Zk0g41Tr5Ke+tEB2+N6mjbv63vjfkQ njq00swfk0mG9V0msFMeuY3B8I0kX6eT5YKMmdu//dGfoHfxV/qT1xmPHNNOAXH/ELJY sGPw== X-Gm-Message-State: AOAM532wnq6muHrUl+xXYaH+i49oIevzzm3NA0M0TOYG36qWBzKzmCEy zQLYZCGGsqKAIQLCz/fGp5aaYX0VQwQ= X-Received: from pgonda1.kir.corp.google.com ([2620:15c:29:204:41d0:ac84:3b61:5938]) (user=pgonda job=sendgmr) by 2002:a17:90b:60d:: with SMTP id gb13mr85565pjb.0.1635443873897; Thu, 28 Oct 2021 10:57:53 -0700 (PDT) Date: Thu, 28 Oct 2021 10:57:45 -0700 Message-Id: <20211028175749.1219188-1-pgonda@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.33.1.1089.g2158813163f-goog Subject: [PATCH 0/4] Add SEV_INIT_EX support From: Peter Gonda To: thomas.lendacky@amd.com Cc: Peter Gonda , David Rientjes , Brijesh Singh , Marc Orr , Joerg Roedel , Herbert Xu , John Allen , "David S. Miller" , Paolo Bonzini , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org SEV_INIT requires users to unlock their SPI bus for the PSP's non volatile (NV) storage. Users may wish to lock their SPI bus for numerous reasons, to support this the PSP firmware supports SEV_INIT_EX. INIT_EX allows the firmware to use a region of memory for its NV storage leaving the kernel responsible for actually storing the data in a persistent way. This series adds a new module parameter to ccp allowing users to specify a path to a file for use as the PSP's NV storage. The ccp driver then reads the file into memory for the PSP to use and is responsible for writing the file whenever the PSP modifies the memory region. Signed-off-by: Peter Gonda Acked-by: David Rientjes Cc: Tom Lendacky Cc: Brijesh Singh Cc: Marc Orr Cc: Joerg Roedel Cc: Herbert Xu Cc: David Rientjes Cc: John Allen Cc: "David S. Miller" Cc: Paolo Bonzini ( Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org David Rientjes (1): crypto: ccp - Add SEV_INIT_EX support Peter Gonda (3): crypto: ccp - Fix SEV_INIT error logging on init crypto: ccp - Move SEV_INIT retry for corrupted data crypto: ccp - Refactor out sev_fw_alloc() drivers/crypto/ccp/sev-dev.c | 235 ++++++++++++++++++++++++++++++----- include/linux/psp-sev.h | 21 ++++ 2 files changed, 222 insertions(+), 34 deletions(-) -- 2.33.1.1089.g2158813163f-goog