Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp759594pxb; Wed, 13 Apr 2022 11:42:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwX8MX82J+W9ZGjTj7PWTo0xT6o12ccAA1hzl+TH92v+2tycn1V1WTLiaPzzoogsUiBFAnB X-Received: by 2002:a63:195f:0:b0:399:1f0e:a21d with SMTP id 31-20020a63195f000000b003991f0ea21dmr35762894pgz.393.1649875362845; Wed, 13 Apr 2022 11:42:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649875362; cv=none; d=google.com; s=arc-20160816; b=VkCYWb1mUNUucynqwxhfqA09ORauIo46zuNdzgS3+Ku3WG1sOIyvgMTpDz636zyUzu SJFuTpx4PC9s0rkXmixVoQUqnRbN2TEY/4qtePrjCjLbR8T1zVHMIihSlGFSnH2iQcQ7 o+XpKCoV1SgxwHdu7MHUM3VjhHmbkw13E/c7AtM8nNdYFxThwa/BlQniRPCEXAdNeEmy d8X5c0bbeqmySwV/h53hGTzq64qohhXFdjZs/acjeQMCaGMnN/grEeKNA4IA6EiJsm/5 y6RI+dDar9g/l90zF7jEcoxZYnMyL8Re+KGz9ShHbxbXDznF8E5TsQIFXRfz1jBcM5fI 3hug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :dkim-signature; bh=esOVAp2irCJ3Vjv6n3zKptfZxPr7nea31riVyn8IwzA=; b=teaUzKoPswpvn6XQL00IB4+a4sFe2V1WhdWQWmWprvbfFiwH/QtnoHt8SfXq+aBz5r rUfbqS5qkDWM7iGyBtfVRBdjAOYL/rbNabHraQprHhBvMg4EeYzB4KTOgMXrIIb0gDwZ es6GgEOgZns64NI+fTLNlfcKk8mz5BSoOn9TP+hZQlSTD9SHsHfNVgJoIqTLvhYjxvNI PT+Glgmr9HD49lyGXR9Q6SUc/lgIxRKz9LncGR/D5zxUtGwUWXX4js0bEZbnpxrSnsAh m1tmVKPuCUV3GGD6PYKS0M7RvF2uenOC+SX7dlhtEw8n5c4ugrAUL4go7kDrTIYZ7WOl mhpw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=mugdlaJf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f18-20020a635552000000b0038648023487si6244564pgm.799.2022.04.13.11.42.23; Wed, 13 Apr 2022 11:42:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=mugdlaJf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235970AbiDMQBF (ORCPT + 99 others); Wed, 13 Apr 2022 12:01:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57914 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231764AbiDMQBE (ORCPT ); Wed, 13 Apr 2022 12:01:04 -0400 Received: from mail-pj1-x104a.google.com (mail-pj1-x104a.google.com [IPv6:2607:f8b0:4864:20::104a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A195863513 for ; Wed, 13 Apr 2022 08:58:40 -0700 (PDT) Received: by mail-pj1-x104a.google.com with SMTP id l10-20020a17090a72ca00b001cd46918af5so1502818pjk.8 for ; Wed, 13 Apr 2022 08:58:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:message-id:mime-version:subject:from:to:cc; bh=esOVAp2irCJ3Vjv6n3zKptfZxPr7nea31riVyn8IwzA=; b=mugdlaJfqV6BzoMRpaiK5wVOC89SQxXWIv/7SA2IWoQeqGxtkOVO5e99zdgZO6ByHl waiSJsfhCL8jqtYwCQ+fct8ZE+R7hsIX7mDJG3xCepYJfGzVjAF17sRtKceMz1Ke6++B jjzcxRMODxHIXlk+civmhu5EkMlEGgmhhDBQ39UBF8bdxHZTihLRAEhZ+kFHYq7ZqRFj BGZxnU/CjHVMuSNUZ+YeDA5zl9m/A0BEuNgfjkFNb5KPtaZ10l4OfZXEfO2hotQy1l2A LmoeViJzWmwIYiPEioHmqUIQ/ZkrOXZayOBr74hv0PSB3twNNCLdMtbml7MOTKkjjJjB KcuA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=esOVAp2irCJ3Vjv6n3zKptfZxPr7nea31riVyn8IwzA=; b=aS0zJvsJrF1UcQ6hbr/yFIcw2uA8hQtt0ZzTkYonI8hnHNnGGUOQHUDGqeCN6cLPpL VUFJd8SCAYx3PB/9YzIRt6HyR17eAO0Kdv9uVaEZq3ld1EoU1PIzja+2uXOMpLDVs/VR t9J63dFGqPGGVaDfrse3Yz22obiiJ5uDjGYxV1fCgiDXykcPPvqDBj2YWjzG6jqUAjZ/ 30ug+xMhIcqxF46wPPQ9PG1Fdfq014lNa8uKPDMdMiXj9Fi7/UT4GTBb58yJH5qtyjR2 01At7Nu+fHPM7u5XJ/fd8Ekxt+jyHCMNDuf1ubYo+OY0imRe4fxC9pTkwodWFi4RnW7y QAPw== X-Gm-Message-State: AOAM53399LSZlWp6KA/dLX3RnP4m/BMMcO3g7DxVw1RVS7mr0TT0s7GO hNgDyO2ZiRmwsyUPWJm8p4rOsq5K7q0= X-Received: from pgonda1.kir.corp.google.com ([2620:15c:29:203:9bb6:f53:456a:fd2d]) (user=pgonda job=sendgmr) by 2002:a17:90b:2384:b0:1cb:5223:9dc4 with SMTP id mr4-20020a17090b238400b001cb52239dc4mr58307pjb.1.1649865519822; Wed, 13 Apr 2022 08:58:39 -0700 (PDT) Date: Wed, 13 Apr 2022 08:58:35 -0700 Message-Id: <20220413155835.439785-1-pgonda@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.35.1.1178.g4f1659d476-goog Subject: [PATCH] crypto: ccp - Log when resetting PSP SEV state From: Peter Gonda To: linux-crypto@vger.kernel.org Cc: Peter Gonda , Tom Lendacky , Brijesh Singh , David Rientjes , Herbert Xu , John Allen , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently when the PSP returns a SECURE_DATA_INVALID error on INIT or INIT_EX the driver retries the command once which should reset the PSP's state SEV related state, meaning the PSP will regenerate its keying material. This is logged with a dbg log but given this will change system state this should be logged at a higher priority and with more information. Signed-off-by: Peter Gonda Cc: Tom Lendacky Cc: Brijesh Singh Cc: David Rientjes Cc: Herbert Xu Cc: John Allen Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- drivers/crypto/ccp/sev-dev.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/crypto/ccp/sev-dev.c b/drivers/crypto/ccp/sev-dev.c index 6ab93dfd478a..fd928199bf1e 100644 --- a/drivers/crypto/ccp/sev-dev.c +++ b/drivers/crypto/ccp/sev-dev.c @@ -435,7 +435,7 @@ static int __sev_platform_init_locked(int *error) * initialization function should succeed by replacing the state * with a reset state. */ - dev_dbg(sev->dev, "SEV: retrying INIT command"); + dev_err(sev->dev, "SEV: retrying INIT command because of SECURE_DATA_INVALID error. Retrying once to reset PSP SEV state."); rc = init_function(&psp_ret); } if (error) -- 2.35.1.1178.g4f1659d476-goog