Received: by 2002:ab2:6991:0:b0:1f2:fff1:ace7 with SMTP id v17csp179780lqo; Wed, 27 Mar 2024 09:59:41 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCW/ZmdJ/tiULzdVEOUlWe8hMawqHA12Yt1PizzQGHQ2zBeJz+0rN0cnfAAMDnZJ2MfSPbbi+RntCFZ9YHHUNiG/SxLaQl86wxzgyBJ9Dw== X-Google-Smtp-Source: AGHT+IHaF8YTTXK3vaG4f/eNW/W7Dv+bgXSKN/HiKqB8UnTC7mLLglKOXUNlLmOb44Rv1giBSq0s X-Received: by 2002:a05:6a20:de22:b0:1a3:c8aa:c934 with SMTP id kz34-20020a056a20de2200b001a3c8aac934mr344571pzb.57.1711558781001; Wed, 27 Mar 2024 09:59:41 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711558780; cv=pass; d=google.com; s=arc-20160816; b=y2B+NaEuYdA7nJo5t6VEEB0nzi+bmRX/cQre/cCb3lvRblB2qg5WIDJOtT3TtGHyJf OuF+qvmuL/hGCAfMWbXIaCDFsORqmrK7k2Hqhar69NclS5t77B/5bIoNDM3IvTVhKfGv jKuBdbwysdk4R/mgWdySBV4p5bd+Y3s8O6q/2vcKGCpupvtodcUoOJDdaBGNaQXHlmgX OrAzh502v6FgoOJPsX1SejPsOm7onQO6Bk3zBXOddh/RQO3UynZuzNGN6CUY1QmwdRnY f4EFWda5D9s1dbFboTEkbroc9RSK1fUuetftKyJbKis7wW2XDhVH+xg21fj19myUqjJ3 JhwA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=tAxocerP1bD0jG/OBN7aP1lNmjzuaT3ct1iIQ4amVV0=; fh=NOzzcwpGCCVd3KhMilQXeBbCRmtNVEnUdr1sER8Xt9E=; b=GCYDUlNVclmGI4/HIqMsLRWPnUH/H4FrEe3tCdzNAsJw4eEmO25G+HSwj7+App0RBs emxMr9zt+P7O6R4v/+3c9wJTzy2Jcb4gJQfdPkWcnWT9+8+EAkhFcA5qj98fp1MqqPLh gZG4+2HGvc3roMnEs6viHVx1C77KDWJ4MRQRw1KhvV2MzKHru1oda8Wvu0GuYkSDNsP6 P1p4S7hcH7x9514a9EntEjCDzh4DJgG19j/BHxHvidQlKplMvjb2z2YWYc4U7kdhLGb8 HTTrcrKru3kxGZ6eH/JAGDzTdqDZwn4ppg1q+KaV9H0YOn3IquN/q4WiaFLQ/IJgfBTZ oh0A==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=neutral (body hash did not verify) header.i=@alien8.de header.s=alien8 header.b=ENKyI+AX; arc=pass (i=1 spf=pass spfdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-121557-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-121557-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id w12-20020a63490c000000b005dc81a16015si11640114pga.118.2024.03.27.09.59.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Mar 2024 09:59:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-121557-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@alien8.de header.s=alien8 header.b=ENKyI+AX; arc=pass (i=1 spf=pass spfdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-121557-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-121557-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id BAF23B3E457 for ; Wed, 27 Mar 2024 15:47:00 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 14B4B131E2E; Wed, 27 Mar 2024 15:44:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b="ENKyI+AX" Received: from mail.alien8.de (mail.alien8.de [65.109.113.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2F3C5131BA0; Wed, 27 Mar 2024 15:44:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=65.109.113.108 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711554247; cv=none; b=MclVkbK91WUb92cOeNkWaHTi2wVM0t1zk3UfxLRiTkfRtmX31P5eToY0d/om3yX+yhtdSzQLNNgX31tJVbni31ZkZGauHuQCq5e6gkBA658nwsC+IHQFowre/nHee2YxB24OXUnk4lJnBRMPsNtjwcFr1qA3JjVWslHdPyOdoyI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711554247; c=relaxed/simple; bh=D6+E5uoJQ6G7TKgRsAZMZJr80d9n1W6yZjC95dfWkNk=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=GI6wjYnkEK87i/HSurIIdQer6lN9sjFCrb8FJORXFAiYFsD3UF7osL/yIQIvaHsASix+L6XY8cK5OXW+grN9VUHAHg7wEvSqSnQj0AkeQX7T3/2VabAKSdjhuCsAn7b2mEl/Ms9jdOF4ZYeRR7iP5IKAItZA3ld5pFoUfWTW/HI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de; spf=pass smtp.mailfrom=alien8.de; dkim=fail (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b=ENKyI+AX reason="signature verification failed"; arc=none smtp.client-ip=65.109.113.108 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=alien8.de Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTP id 1DBA740E02A9; Wed, 27 Mar 2024 15:44:03 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at mail.alien8.de Received: from mail.alien8.de ([127.0.0.1]) by localhost (mail.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 3w9bjIk7266G; Wed, 27 Mar 2024 15:44:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=alien8; t=1711554239; bh=jmK0cjraSrwkY9e375az1GRBwh22aHXiWu6RP3/ODdQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ENKyI+AXk+a1wYEWMCqFdvXEWkqNUgbzfLZ/p5UPHOld29ytRqDKuuqryPIBDCYq5 m2JzEPSF+IIrlejpRcIhUThBUc4IpIIv09bRFwdoF6GLiwklzC4xEB2s+hpgG6KkxB CjR259QW1ZX6GWRskXHhKNpmHUdAjRszprfpjuu5E/kmqvSChH0mXjU7d0/XUuWdPH lX3bxmv2G0noZw/Y12i4T6rhwdNPY14BgsWeZH8AhIh8HD0jkYYLucjiNOFJcJ6DU0 EcCL5q+0hSSJ5aLn6+sL5+CfE49TFJOqwMdTaxy4GyeTO4TbZVrbx3MQ3qX9MiMXDu ExmxVfMKFpVDQUMk73dE9w8cPfFwhAc7j9DlhE90wQ7ixw6VgICNHV9StxEe0JQYYw NUypYpz4PfJT3ra3oP8DCQmecGFCSi0QRzUTeBcEnT66aCOUCTYJF0YGJLKnlsQL1q kLbCkuJet8tpTYzLBUokjmIhuwN/D6cnc5tL2swxEATPtyuugMk/MxE9XCUJGSCSwC U5y7fjObOjVMkbGrQadYDxflbdqWvys/Yfhovh2mRcQEsVfDvA4I4OG4F1XN8RqfWG zAoRAme/vOMUbm6u20BsBYvWB+H1m55H6BZBLuB6vew30d1eLb4YdxAju8hkO0tDAR Wb59weSD6O1W1fnUKmGIlXhE= Received: from zn.tnic (p5de8ecf7.dip0.t-ipconnect.de [93.232.236.247]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id A430C40E0028; Wed, 27 Mar 2024 15:43:52 +0000 (UTC) From: Borislav Petkov To: X86 ML Cc: LKML , KVM , Ashish Kalra , Joerg Roedel , Michael Roth , Tom Lendacky Subject: [PATCH 3/5] x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM Date: Wed, 27 Mar 2024 16:43:15 +0100 Message-ID: <20240327154317.29909-4-bp@alien8.de> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240327154317.29909-1-bp@alien8.de> References: <20240327154317.29909-1-bp@alien8.de> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable From: "Borislav Petkov (AMD)" The functionality to load SEV-SNP guests by the host will soon rely on cc_platform* helpers because the cpu_feature* API with the early patching is insufficient when SNP support needs to be disabled late. Therefore, pull that functionality in. Signed-off-by: Borislav Petkov (AMD) --- arch/x86/kvm/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/kvm/Kconfig b/arch/x86/kvm/Kconfig index 3aaf7e86a859..0ebdd088f28b 100644 --- a/arch/x86/kvm/Kconfig +++ b/arch/x86/kvm/Kconfig @@ -122,6 +122,7 @@ config KVM_AMD_SEV default y depends on KVM_AMD && X86_64 depends on CRYPTO_DEV_SP_PSP && !(KVM_AMD=3Dy && CRYPTO_DEV_CCP_DD=3Dm) + select ARCH_HAS_CC_PLATFORM help Provides support for launching Encrypted VMs (SEV) and Encrypted VMs with Encrypted State (SEV-ES) on AMD processors. --=20 2.43.0