Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp761508ybl; Thu, 12 Dec 2019 04:35:08 -0800 (PST) X-Google-Smtp-Source: APXvYqxq0rcEj+77pMXtn4Ahjar8oXR8G8KInPO3l+dKOwYBACQImfsJnc0FLzgf5xJPyyoaLASS X-Received: by 2002:a9d:75da:: with SMTP id c26mr7980670otl.40.1576154108011; Thu, 12 Dec 2019 04:35:08 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1576154108; cv=pass; d=google.com; s=arc-20160816; b=NP4J6CIKcb0+xHqIHYPZlU2KYEesMmS3zjLzBefZ3qEuyD80LksYWdm76CLloy8hra oB0oojj6IJQI6dpw32ajDozpZDgF2WRwNxf1b/RpHe1PpPorXUVgDMR9kjGwIuI0bO/1 7W66aAOw4p5gf/MQ5qzNAwaLoBJ/BwR4RUPaANpo5QmeQibs4Hh9tLoLRuxx/VtziCMx zMu4kYRzpBJW8O7GYa+pOPMQHKSKot5mLnZHNiE0aLFb/r4HxHwVF0A+b0dzAXVLyzGQ aEeTI3mY//q6dWrFK5gHCs8rWWcIA8IHnueLfMHHWzqfePNi9LVfroRNtGY+qmQeOpIi T2zA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:in-reply-to:user-agent:date:message-id:from :references:cc:to:subject:dkim-signature; bh=uUQpfeIDYSarxxOJ7lZR89YNELOGct65WAfmtDuodAc=; b=x0T1fw9XM6TZTeUOpgflD6ioQ7Humpiva0g2HabhLh/Eq5hu92v1KmfDlrmHO7dEQB eYfhG9zjs8vWuI79M30hAtoxxCVG2ELGoEwQpVZ5rLQhNsEDVac0RCmISUIsmuS6K+fl 9wvI3lJckK35qlONUjCQ7H8PiuLnWcXo3wwg9hQsyBcFCTZ176wk1WLWkWDYjO2CV/Sb q2L5xPxp0e9RYr/di6Sv6EDxRn+OOcL/hGrDfouBLzzSWae3bhL2dJdic1nGsd5jeaCl rZzmDZ2e21j3qfKFXxwghf1y1gdwcaOrEowk0C227PMBlOVOqPt0XCxdSfHdTBNhtrdq ymxA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b=KXqhQYlM; arc=pass (i=1 spf=pass spfdomain=amd.com dkim=pass dkdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k2si2895339otp.273.2019.12.12.04.34.47; Thu, 12 Dec 2019 04:35:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b=KXqhQYlM; arc=pass (i=1 spf=pass spfdomain=amd.com dkim=pass dkdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729239AbfLLMeX (ORCPT + 99 others); Thu, 12 Dec 2019 07:34:23 -0500 Received: from mail-dm6nam12on2088.outbound.protection.outlook.com ([40.107.243.88]:6048 "EHLO NAM12-DM6-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729170AbfLLMeX (ORCPT ); Thu, 12 Dec 2019 07:34:23 -0500 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FOeNBEkkbyoDL65aoqPkg/TG2RtnJJ2YrELEUhUHvYUlRaUL5PVwF5AqLPgqh808JqGK4pdF/r1Gh5Chl6aKM9b4cohTM94bJ6N6G4Ua/LuTovB4zcrJYVeKRsKYvj1cMsSVv6uVMCRDZEVbIQENtx0m3LSTgSV01l2GK1JyVChkV5Qw7HAqD8933oxCyIw1rfBiIaFG8qoeZU5KZgTmTWjvsPMzIq6W4bMey4MeUoQJbtsVKofvtPpe1OL2BQ3zSdwl54suN5siVD3wt2c3GjowR223TaKv80wU5fnKe5X9oirLgQRmWkiYhXlOeLwVlgfPK6iU/WEkfXYr/HXEVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=uUQpfeIDYSarxxOJ7lZR89YNELOGct65WAfmtDuodAc=; b=eX/7UN1e828S1Lx7FaPcuYS1bwd+At8BNunNJ3E0mmlUXVSAOOy6QY77vTvLXTp6QdXb5gWV91o2PI1yePcqcp3fLPbluP5kit+mFwH1b4Ieou5GaUHGrUOxDxKu1ukeMcdHihcB7LYcQzlXwkxRUohObDrR55nNoW0a+ssHjUNSt10wQWMGyW5CMHXMPujrMgN5wsMV6ODUuMofKq/LP1LXNqw7YX59K1Y9l2B7CH8YPM3ya5onZEnRFNDVec47StAIJolbefeB3LA0e8jcIp3IAeqz1kfTYOsp2F/zs3lW6jsvRMc75v7z0H5IHT85btkZdJlcJFiAxQd0qqIVnQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector2-amdcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=uUQpfeIDYSarxxOJ7lZR89YNELOGct65WAfmtDuodAc=; b=KXqhQYlMdBT4bJMCcJTBxPo02MaCc9wBvTn7d2C8CQ04BEGiZauubkKNoTkbxm8uBOOCBhMx7MKg3515FPNb4YV7JqSodbN0dcrYQtYY41f1kbk9q5AN/KDCAkOaQRZyUeqYtadopK6C1meQBk+TctR0lS81CeoZWlN4Bg/xanI= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Rijo-john.Thomas@amd.com; Received: from CY4PR12MB1925.namprd12.prod.outlook.com (10.175.62.7) by CY4PR12MB1575.namprd12.prod.outlook.com (10.172.71.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2516.12; Thu, 12 Dec 2019 12:33:40 +0000 Received: from CY4PR12MB1925.namprd12.prod.outlook.com ([fe80::cd8b:1d7e:31c2:e8b4]) by CY4PR12MB1925.namprd12.prod.outlook.com ([fe80::cd8b:1d7e:31c2:e8b4%7]) with mapi id 15.20.2516.018; Thu, 12 Dec 2019 12:33:40 +0000 Subject: Re: [RFC PATCH v3 0/6] Add TEE interface support to AMD Secure Processor driver To: Tom Lendacky , Gary Hook , Herbert Xu , "David S . Miller" , linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org Cc: Nimesh Easow , Devaraj Rangasamy , Jens Wiklander , Ard Biesheuvel References: From: "Thomas, Rijo-john" Message-ID: <26cb9589-8774-897b-4d1e-919e7ad2200f@amd.com> Date: Thu, 12 Dec 2019 18:03:20 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-ClientProxiedBy: MA1PR0101CA0004.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:21::14) To CY4PR12MB1925.namprd12.prod.outlook.com (2603:10b6:903:120::7) MIME-Version: 1.0 X-Originating-IP: [165.204.156.251] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 14a89bfa-969c-4019-9e36-08d77eff8479 X-MS-TrafficTypeDiagnostic: CY4PR12MB1575:|CY4PR12MB1575: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:6108; X-Forefront-PRVS: 0249EFCB0B X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4636009)(39860400002)(396003)(346002)(366004)(136003)(376002)(189003)(199004)(36756003)(2616005)(81156014)(8936002)(66556008)(8676002)(81166006)(110136005)(6666004)(54906003)(31686004)(66946007)(316002)(6506007)(66476007)(53546011)(52116002)(4326008)(6486002)(6512007)(478600001)(31696002)(26005)(186003)(5660300002)(2906002)(966005)(86362001);DIR:OUT;SFP:1101;SCL:1;SRVR:CY4PR12MB1575;H:CY4PR12MB1925.namprd12.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;MX:1;A:1; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: xS5xpqFEZpzYyqI72Wb6SlAsd42QtY1bC9Q5he8otvt/Zxuy9zrr+/kqGkxiHfEXc4sMvGwKv3EBS3UgrGEmea/EViuE1aafRRoXAkU70IzS/IYF8y3j1f/A6ubtEp66FP2OLn/xPsQdn1oOOG3KHER2HsDo8mdydIbbMdh8DGzJ2Ev0uBz7+NTfDW/6FDx/6zerafTznZKOEBpIgrnsK9m8VqPpKLJ07ax138fmBC0rsaa9Zx11eHcFRpMHHQtvIgjGH2m8swIOAC0ppDKv7sNYboeQMImBHOwUvvZvGhf1GwlqrrWaz8C4W/dxZopSuaRcX8JaHFS35VFJWu0Uq6X5M/nI0Ys99PeKQ5fnTXZ/siA1CjF9paRiB0AMpYaA7cfvS6AGmMosjlj1BWIiHvzPLw1ZmUO/ldcuFJNyzhm5w6j5bpFod9M7otccT0mA X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 14a89bfa-969c-4019-9e36-08d77eff8479 X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Dec 2019 12:33:40.2826 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 1QhdxlKxjvQ6eQC3t6BleU0s1RqCqkbPlgcLm3YXPWeJJvieu4I+HsXTJCuAlBAMY3e0YLXJuE4CD9FK6hozJw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1575 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi Herbert, Please let me know if you have any comment for this patch series. Request you to consider these patches for next merge cycle. This patch series exports an in-kernel API which will be used by AMD-TEE driver. The patch series which introduces AMD-TEE driver can be found at: https://lkml.org/lkml/2019/12/6/17 Thanks, Rijo On 04/12/19 11:48 am, Rijo Thomas wrote: > The goal of this patch series is to introduce TEE (Trusted Execution > Environment) interface support to AMD Secure Processor driver. The > TEE is a secure area of a processor which ensures that sensitive data > is stored, processed and protected in an isolated and trusted > environment. The Platform Security Processor (PSP) is a dedicated > processor which provides TEE to enable HW platform security. It offers > protection against software attacks generated in Rich Operating System > (Rich OS) such as Linux running on x86. > > Based on the platform feature support, the PSP is capable of supporting > either SEV (Secure Encrypted Virtualization) and/or TEE. The first three > patches in this series is about moving SEV specific functions and data > structures from PSP device driver file to a dedicated SEV interface > driver file. The last two patches add TEE interface support to AMD > Secure Processor driver. This TEE interface will be used by AMD-TEE > driver to submit command buffers for processing in PSP Trusted Execution > Environment. > > v3: > * Rebased the patches onto cryptodev-2.6 tree with base commit > 4ee812f6143d (crypto: vmx - Avoid weird build failures) > > v2: > * Rebased the patches on cryptodev-2.6 tree with base commit > d158367682cd (crypto: atmel - Fix selection of CRYPTO_AUTHENC) > * Regenerated patch with correct diff-stat to show file rename > * Used Co-developed-by: tag to give proper credit to co-author > > Rijo Thomas (6): > crypto: ccp - rename psp-dev files to sev-dev > crypto: ccp - create a generic psp-dev file > crypto: ccp - move SEV vdata to a dedicated data structure > crypto: ccp - check whether PSP supports SEV or TEE before > initialization > crypto: ccp - add TEE support for Raven Ridge > crypto: ccp - provide in-kernel API to submit TEE commands > > drivers/crypto/ccp/Makefile | 4 +- > drivers/crypto/ccp/psp-dev.c | 1033 ++++------------------------------------ > drivers/crypto/ccp/psp-dev.h | 51 +- > drivers/crypto/ccp/sev-dev.c | 1068 ++++++++++++++++++++++++++++++++++++++++++ > drivers/crypto/ccp/sev-dev.h | 63 +++ > drivers/crypto/ccp/sp-dev.h | 17 +- > drivers/crypto/ccp/sp-pci.c | 43 +- > drivers/crypto/ccp/tee-dev.c | 364 ++++++++++++++ > drivers/crypto/ccp/tee-dev.h | 110 +++++ > include/linux/psp-tee.h | 73 +++ > 10 files changed, 1842 insertions(+), 984 deletions(-) > create mode 100644 drivers/crypto/ccp/sev-dev.c > create mode 100644 drivers/crypto/ccp/sev-dev.h > create mode 100644 drivers/crypto/ccp/tee-dev.c > create mode 100644 drivers/crypto/ccp/tee-dev.h > create mode 100644 include/linux/psp-tee.h > > -- > 1.9.1 >