Received: by 2002:ab2:6f44:0:b0:1fd:c486:4f03 with SMTP id l4csp143389lqq; Wed, 12 Jun 2024 20:45:25 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWxmJ+hhKdxsWvgzylYZt0Lt10Sf0nsM22m0AqB5vuE1dhvo0WycIQVkBvQ/ef775akV/nH8hmcDIJ3couJQcWc78bSOmRkNdq3VYm3Rw== X-Google-Smtp-Source: AGHT+IEUvQ22cDWqzUpO9j89ZOrVnJUCJ2PpC0A/OgnHljLyTzt4LjfBNA9KWh9UEIpCHMAO6SAC X-Received: by 2002:a17:903:22d2:b0:1f7:ff:b477 with SMTP id d9443c01a7336-1f83b7e07c0mr43670115ad.55.1718250324784; Wed, 12 Jun 2024 20:45:24 -0700 (PDT) Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id d9443c01a7336-1f855ef26basi4287115ad.425.2024.06.12.20.45.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 12 Jun 2024 20:45:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-212539-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=2YWrbQls; arc=fail (signature failed); spf=pass (google.com: domain of linux-kernel+bounces-212539-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-212539-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id BD44CB23442 for ; Thu, 13 Jun 2024 03:41:06 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 76F681311AC; Thu, 13 Jun 2024 03:40:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="2YWrbQls" Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2088.outbound.protection.outlook.com [40.107.244.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A696E126F1D; Thu, 13 Jun 2024 03:40:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.244.88 ARC-Seal:i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718250054; cv=fail; b=D1eVCZqb/7e0cEUAv+hbPjQznn7hqMUgSoNqiQReXfqnzMs668Z7Gp1DYa+agXCjlTLP6QcoUT4nPJ3r+OHQM+/jzXN33ltyTikBhEsYWybrUtAk8tOE9OiYbUVSqplOPJuSaxxDypsk0qu2vgmkhP/jvCgvjzG88XtuwXsrgew= ARC-Message-Signature:i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718250054; c=relaxed/simple; bh=J7MSE9WEJAwrqj0fkwrrPDLhZdVnUdbnE3PikGnVvC8=; h=Message-ID:Date:Subject:To:Cc:References:From:In-Reply-To: Content-Type:MIME-Version; b=CifnaxM+TznFe9EJYywjoi20c/O1i7WL7Nrny3FcB8r4Jee1RAFNxeNNdqvNdTd4jZWa1MwF/JcxZXEau/Mc9WH36bAazKgiJR/ud+3j+GXIOA5HQC9KZCMrFH4GBtphIS56F2z3CfYgIYqU4h9GmUgi9abv0NoqVT7W1UFLC0Y= ARC-Authentication-Results:i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=2YWrbQls; arc=fail smtp.client-ip=40.107.244.88 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cRz78y9uvTh9qMgEWBKf+imhQpGOCEl9TL6LLgqbtpFTYbnkqGfmyq50uIaApEt0pjaNzSN4eHIHmE/6zxp9UN9itAVesA6Op9XiypuKtdCvUJ8LOtqjO0OVuC+zzwC9QLiobUdNrn7IOJxEYWJS3HftdBdPrs9ZTyp1IwP1LIlCbep44OS3qW0GfFXrSOEiZJ9nzaB8bcRaA+rEDyUPVZWOYDarQhJq1cV4VALi0h78XjRYiF+gLA8AOtnkZ7jg1Lrr3dBdbODMFRPqCkUYQSl/vG0FCQ8ynaFvbqPPbdec8VWSYapzRG8vg06QEp1vVIqKNTW1piuMatjaJtEHjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=LhY6V0rnylAoV/mF+AGEm+tRD8SdhuYv3WLQkkSnld4=; b=mQmBmh0l9HKHKMf5gs8Yc/SPSheQcp/45KwIwUr3/0ddwQXtgm5NiQP6Ya5JfXFiAV7MWGePVIt1MJiejMCwDSogoHcNYTXBDMzySqkMqTY7e6vWRbtKFKuZpMzQB/6XPz+pwYcEEABl83F65AU3VL2d+ZqOn04W4NtVEK6bw7riREVFziMc97cmgjsgPX7KMAysosgVoR35NwS00idK9G7GXfGlPOZtTK3AWyG5WVV126fCiXLpbLb/Q+EEFRIInmYlOo0PuwvGt3fBmHUCa4SZ5uONZtk9vUhc6VVm1oDhY1Vtkd/DSKgSQ5YuZVpqUnz6LyJ9Ch14g6+nN0HqwA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LhY6V0rnylAoV/mF+AGEm+tRD8SdhuYv3WLQkkSnld4=; b=2YWrbQlsaUCdfboyU48NVSj8v57U/Vkv8vZ1KdsKB38MFb14fWTm6naN/PXVEY1q2FvvSa1NeqJlkzZ0Nqg+iXGRVg19ZV8aJwOZWRiUsRqMMtv+dtdut/0jP+3iymHNmJ74MnV0rTOwAG9+LJyYzdMOA7TTmybDUwv6KMccxUc= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com; Received: from DS7PR12MB6309.namprd12.prod.outlook.com (2603:10b6:8:96::19) by PH7PR12MB6588.namprd12.prod.outlook.com (2603:10b6:510:210::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.20; Thu, 13 Jun 2024 03:40:50 +0000 Received: from DS7PR12MB6309.namprd12.prod.outlook.com ([fe80::b890:920f:cf3b:5fec]) by DS7PR12MB6309.namprd12.prod.outlook.com ([fe80::b890:920f:cf3b:5fec%3]) with mapi id 15.20.7633.036; Thu, 13 Jun 2024 03:40:50 +0000 Message-ID: Date: Thu, 13 Jun 2024 09:10:44 +0530 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.0.3 Subject: Re: [PATCH v9 01/24] virt: sev-guest: Use AES GCM crypto library To: Borislav Petkov Cc: linux-kernel@vger.kernel.org, thomas.lendacky@amd.com, x86@kernel.org, kvm@vger.kernel.org, mingo@redhat.com, tglx@linutronix.de, dave.hansen@linux.intel.com, pgonda@google.com, seanjc@google.com, pbonzini@redhat.com References: <20240531043038.3370793-1-nikunj@amd.com> <20240531043038.3370793-2-nikunj@amd.com> <20240612171710.GDZmnYFizmJoS5nMS1@fat_crate.local> From: "Nikunj A. Dadhania" In-Reply-To: <20240612171710.GDZmnYFizmJoS5nMS1@fat_crate.local> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-ClientProxiedBy: MA1PR01CA0165.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:71::35) To DS7PR12MB6309.namprd12.prod.outlook.com (2603:10b6:8:96::19) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS7PR12MB6309:EE_|PH7PR12MB6588:EE_ X-MS-Office365-Filtering-Correlation-Id: a2111e93-6bec-41ec-30c3-08dc8b5a9e2d X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230034|376008|1800799018|366010|7416008; X-Microsoft-Antispam-Message-Info: =?utf-8?B?R0FHTkp6OFVXbmN6cWprNlhNZ2VDNnFXb2w5K3RCUllVNW9iajl0VUtrcndl?= =?utf-8?B?a3lQN1ZBYWdaOS9kYnFMQW1rMnUxaVI5LzZDc1l4UU45bVFSS0NaVGpMUjJK?= =?utf-8?B?cXZiamxac0lnMVJSYnJTNERaSHRxcW9tUVROWG9vRmZOOGZGQmMvUXdHWVB2?= =?utf-8?B?T2FFY3NWMmJvaGUyRTlzeHF4WDZtV3d5ZnVQZXJPN2ZvSit4TXlpVWwvUE5i?= =?utf-8?B?S01BdGVJR1pGdit0TnNqVld2UUczNmNvaXpXb3Q3Q2hjRjJKckVkc2liWHhn?= =?utf-8?B?eUhBeWlWLzlmdDR3emFLSUlGUU1OUnFUUTdUYXVUNFByQUQ1YUVsWTVxTEZY?= =?utf-8?B?dGg2K1didGxUajg5RGYvbWhYT000V2g0V3FDaElLUnRnQUdoSkJ4RVM3VHhZ?= =?utf-8?B?Qm8yZldzTnFBeVNpUVo5RW1UWXpGVmtnUzRwSUFkdnQ0MFhIRjFvNWhwL0ZH?= =?utf-8?B?d1hRYUJscmY3cVA4aEdJZzNta2xFWjdYNE9UcHIxQ0dzUUVNZ0tLaUxuR0py?= =?utf-8?B?QVEzS2gxaVpKRytNOGZHRnhpRnM0OW91STFPT3QvM3NHcDBOd2IxalZLRzM3?= =?utf-8?B?aTZseXRIdDhoaGNzMHgrekZjVmQ1YWFjOVFZSkFZYzFkMDVHUWRIbXVzMndz?= =?utf-8?B?RDhNYTI5K0l4SlpQN3E5Rlc2bThYZ04vY2RZVWlIZjh4SnNxNUgvSXdHVUdp?= =?utf-8?B?bG1JS1pCMTM0U2hkVHdESnhNeSt0SFpJSyt3bGQ3MEhBNUhJWTd4NThQd1lN?= =?utf-8?B?UWJ0OGZpUnB1TURiZUNPRHd4ZmgwNzJvenh2TXMzYnNjQ2lCREZ1WHVZZjBE?= =?utf-8?B?TmNqVlVsandYb29kV29hcmV4T29ldUlRRkM4ekNnOGUrbWxGdHp3ZlpPclE5?= =?utf-8?B?Z2xGV096dXRuakd0UzU1U25jbE5nQ1RHYlZQbmxXVkVhRnB3R1orcTdkcGR3?= =?utf-8?B?VU45cGVmaUx1M3AxdThobU9FNFlyRkFiaUtWMHZFNEdnTnZIMTBKMUZtWGtY?= =?utf-8?B?WElSU2FyR2QvUDFES3h1dlFRNXArYW9pUm1WQ01NK2FXMms2N3JhMGpDNkdw?= =?utf-8?B?dTBaVDc0Zy9EV1V2NnJBOWd1ZTFGMTFIOEtsTWhJbXZMM3ZyeDFtUjFHRG9s?= =?utf-8?B?cUQwVzB2aE85anVKcUJzcFNpeEJRc0lYWDA5cHAyM2xhVWlMVzc1ZjVmREZQ?= =?utf-8?B?dmJUbitMOHYwVjFxUFpMQ1p5ODE4RjNHdTJ0SHRWNDlHYWpxMmQ1TlJjOTd2?= =?utf-8?B?enIwa0dUZFRiMXBjMTlqN3UyZ2ZSNFY0Q2NMVEJOVHZDTFEyRUdWMS9scEFB?= =?utf-8?B?MFlqYjdpZ2tVS2F6RWFQSDZ0ZFRzYjE4NmNkQnFmcmo2NDlhNjdkcGlrSlJk?= =?utf-8?B?cDhHK3hSenZ2WGhRL3Vua3M1WGcyaEtkZ3VTdUIrdXZHMGtDZFNxSXJ1M0h5?= =?utf-8?B?d1JjTXdRaXE1ZWxIbk45OUE3Vm93YkUvV2paTzl2TFBRa2JBL0RDa3FLRlp1?= =?utf-8?B?aDdSRnlOV1hub2UxV3ArZ0dyWXFyTldNTG0wOXZCc1k3cWhpM3J0QzJuQUEw?= =?utf-8?B?Nm9ibTNLL2hOUkJYSWt0cWRsUHlNTTMrWUVrdE9OeTBZTEZNSkpIeWFYR2hF?= =?utf-8?B?WDFSVGUyaU1zQWdyU2Q4dHA0b1NZanBrYS9PZzFWTWYvVy9oZnZYYTdscE5h?= =?utf-8?B?eVo4eUR2MDl3SkVTYi94QVo1dlBOM3dIbC8waWdOQzNZTHJXb0lqVHNnMkM4?= =?utf-8?Q?fXrGfMBoIIKz2CtLcKiSo8gDRIYIaY6f0gCE0Zt?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR12MB6309.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230034)(376008)(1800799018)(366010)(7416008);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?QXhaNEhyM3hPTnNGc2t3cUVKODNsdHZ4RWxxMngxS0d0Wk15aDB0bTdwMVlJ?= =?utf-8?B?cy9KaU1Bb2s0ZFJCeWJNdHlISElVejRDQVNBWnk1Z09uVDM0a0tEZTJKZyty?= =?utf-8?B?MC92RnNmUy8xYkR6TVA2QnErdk9rU01rV1plSDIxaVpqWE5nWTFrMWttSjQz?= =?utf-8?B?alE5dHNab3JwUE1POUJ4b0tYVEhCMDlVV2tpbU05enE5dWMxQkxBTFRpOE02?= =?utf-8?B?THFlVVJyL1JCcHFBMWdDV3JtaG9KekxHenRXeEtkdTVnODRSeUtnclgvYVhU?= =?utf-8?B?Skp0ak14MEhwbVhMQjF6OFVTdVBVd3NRMSt3bG43UFd1ZXhPMWkydEgrdFZG?= =?utf-8?B?aFhNc05iaDlsQXJJK2o5djltN0w1L2pDbVpVTHAxUG1MQmRVWnhYTHpiczEv?= =?utf-8?B?UklVNTJoM044dEVLT0tZbHIrWmFiTkRwS0RMN1BIWVBEamR1OUtoNVlrTTRM?= =?utf-8?B?NkZNUTliU0xoQ3FpT2FsU2VuYXZ0TjJUdm5URzRTbHRPQ0hleFR4ellDUnp3?= =?utf-8?B?eGN5bHQzMGQvL3ZiVys0ZjJFdXphME9SSXd0eEh2bUNRbUpJK2VSRU5yK2Z6?= =?utf-8?B?eDVrN09SeDV1WUVLSVlEUlJwSnMxUUtYalVhV0I4ZkJRSXg1b1UwaEtDVGdy?= =?utf-8?B?c1hERkxQQUsxdVo1WXVWam4xNlZZdVZwdEpxWi9jelNRUDlKeS9Zd1czWnpR?= =?utf-8?B?TVhjM1hUK0R4REMwOGsxM0Q1QXRiWWtveVpXd3FJQWNFZVlsK0Y4SE1qUHdJ?= =?utf-8?B?ck5vVkZRekFBNU5QWHFCbnkxbk5uMkhsZVVUV1JoVmxTQ3dNUE40eXhTQWhZ?= =?utf-8?B?RWFpdEZ3YUxlOU0xOVhrMDFOai95SGZBSUZiZXo2MlhoeXArZGdYMEdYOVNa?= =?utf-8?B?aFVkNHI1YmRaL3hta0ZJUlFzcTRmWnBCSXA5R3NzdkdDV3RJdWIwU3BBWjFx?= =?utf-8?B?eE1KUmNoN0ZMT3pycjZVWXZvdUNFSXpkZ2orVUNnbzhJK2drY28yRWRLTzZ0?= =?utf-8?B?R3k2MzM4aWpDclJ2dzVjOWZHNjhYZnFPdWZQM0dMcEwycU5uNmtRSFBKajV6?= =?utf-8?B?TE1JeVNwTFFsVEh6WVR2M1E4aGpuT0tyZCtNcUl0blRFN2VoWVdZVllUcDlU?= =?utf-8?B?b1RXRUZFc2tOUm54bDdqb2hKUmEvVTdPNTU5c3RyTkxxbmZsRW1GS3NCRmRH?= =?utf-8?B?cjRBenU2VE1kZDJUamNPd3dBU054MGpkMDFVS2p5TFR5UitkTjdMM1hPMTVl?= =?utf-8?B?M3dxNkRuMlZzSXByeEZVbW45T0dBME93bG8xellGVTQ3VWVTT1A4MDdjbTFh?= =?utf-8?B?c2dGdEV3My81VmlOazdWK2dPUHZKT2RjWnVDMWZUcVlPbnhlbVNXRDlxSjRY?= =?utf-8?B?TEd4T203SzRxc2M5VHRKV0ZVNEZaUG13WWZuTElEdGl6R0djZW1LYWt0ZmJa?= =?utf-8?B?RVV3ekE0TlR6cjlKc2lSNzhmSzl0WU9jUVV2Z0UyYTZlYzF3N2lpeSt4TkhT?= =?utf-8?B?S2ZrcWRGZi9PSGN4aGR3R2pEMlNPalRFUzRkUWUvc25UNjlWQjdzWjlXd3Fm?= =?utf-8?B?ZW9NeGJMa0FCNnN0cEtsY1J5M0RZU2d4K0tjQzVtV0Vua1h3Q3JUWThmb3RV?= =?utf-8?B?WHBBRituUXN1SW04SUNEWGdmNmpuS1BjdlJtQXVZVmM5UmoyTkNCUjk0L0x5?= =?utf-8?B?ZUg1WFBZUVpEbkZxT08veGs4UXlHWDNLcENNKzRyb2FDbHVGV284eCtCa1kr?= =?utf-8?B?RzJvenMyYU00cnQ0ZU9OZnFmVmlmTGhDY2xCRkV6NVgwK0w2WFBvQytEVmww?= =?utf-8?B?dENDQ3R0aUNtb2JZc0cyT3lZY2l0TVR5c21xSXl1T2M3TVMvVGVoWGxDS01h?= =?utf-8?B?NlpLNUgwMFVrUitpaTd3bmJOZ0hpcW0rRkFKbzFCaVlhaysyQi83UFVzOENN?= =?utf-8?B?VEZYRjYwNUhxaHlKMW1IVVFMay9LK0xmemlBOVUrUVR6WVdEU1FrOFRPL1pN?= =?utf-8?B?UVR1Qjh5aVpTcUozeThQanNYVkEzaUZVYnk2RUNBbFYzcDRMalJuM3V2aFR4?= =?utf-8?B?SlR6b252S1RMeEdvTnA0TGZNUXJUWlg2TWNkcGM5YjRJTGYwcDdYeGZsVnVx?= =?utf-8?Q?B9pEalH954ZYmF+0Xyhl49LXG?= X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: a2111e93-6bec-41ec-30c3-08dc8b5a9e2d X-MS-Exchange-CrossTenant-AuthSource: DS7PR12MB6309.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 Jun 2024 03:40:50.0274 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: jS1X6EphbURILVq1bcOLxqbpcdm6zz1yWUHgYCDK0F496/Ha3rrXSvWIu9mYVHVpbGIGgGlNugWcdzfFP0Y2XQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB6588 On 6/12/2024 10:47 PM, Borislav Petkov wrote: > On Fri, May 31, 2024 at 10:00:15AM +0530, Nikunj A Dadhania wrote: >> The sev-guest driver encryption code uses Crypto API for SNP guest >> messaging to interact with AMD Security processor. For enabling SecureTSC, >> SEV-SNP guests need to send a TSC_INFO request guest message before the >> smpboot phase starts. Details from the TSC_INFO response will be used to >> program the VMSA before the secondary CPUs are brought up. The Crypto API >> is not available this early in the boot phase. >> >> In preparation of moving the encryption code out of sev-guest driver to >> support SecureTSC and make reviewing the diff easier, start using AES GCM >> library implementation instead of Crypto API. >> >> Drop __enc_payload() and dec_payload() helpers as both are pretty small and >> can be moved to the respective callers. > > Please use this streamlined commit message for your next submission: > > "The sev-guest driver encryption code uses the crypto API for SNP guest messaging > with the AMD Security processor. In order to enable secure TSC, SEV-SNP guests > need to send such a TSC_INFO message before the APs are booted. Details from the > TSC_INFO response will then be used to program the VMSA before the APs are > brought up. > > However, the crypto API is not available this early in the boot process. > > In preparation for moving the encryption code out of sev-guest to support secure > TSC and to ease review, switch to using the AES GCM library implementation > instead. > > Drop __enc_payload() and dec_payload() helpers as both are small and can be > moved to the respective callers." > Sure Regards Nikunj