Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp1640137pxb; Mon, 23 Aug 2021 00:34:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxKcaGQEQXWtFSaK2LpF30pS6bHR8CZTFEDhSrrCdKza964NeNn1WPmwpJWGYb9PZHOnOIb X-Received: by 2002:a17:906:2844:: with SMTP id s4mr33771519ejc.263.1629704055988; Mon, 23 Aug 2021 00:34:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629704055; cv=none; d=google.com; s=arc-20160816; b=Byj4NB6+sabDLFvX1Rd7/zKGfsoKpDWWTupc+sKIZrs84+DoqzQaUv4xnOcrhkzupR J6wqVbMqr8Wi0+9RGWff+4q6j8A67YrjY16I5EMZs3OcULSiK1s44vkED+vKzmqVb8GN 0YmmOVpRBPU70KwVWRGSqWHWgqw+i7wbkZuIOmEkhzZLTzVT5Klu5c1PibqzzjyUjL3u nhRCFyRdPWuMEVY9xyuHBQs8/D44NAJ64MwLaDhEHCGn9fs4Fpiqp8gXXQ3xU37o8tV9 kvbmyKYujqkaKw/9hmmpAkjCa8iCU2oVV4SU3+opaU57c9te/a5N/1BRoJgfRa9juF/P 9F0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-hdrordr; bh=V+TpcIhugsqBT3ZzqfEVB/yrmjebuOXSSwa23HVGf2E=; b=wXDrKlZPUvKyNN9VWLgrMoRvvT1otJV+3c9PcMLSZBW27YjODjlQSnszi5UHqlkpCr mtdkF1feTreSjN1NQA262t49nGnDK/ropJYFNBCK+n5b+bYo8QZHyChE3F/Z1oiO+uV8 wDL6V5L9MimqIIC4F4S+ryVfZQBFCFjRslhTdScQqGjXm64AIhHholTQ+29yqdl3Ccz7 tt5Mk9O9crqkhQaNKWmNakErqS1v9vTfGvmHu/4cOi6UGH3Lgk/Ug1O2SL4+PmsvbniM Vdvsa2FgQKXzI7lpKU/5BswhY3XDnBaaQ70IkjXo5zWfbX77xHi7YfNDtxCFgvG2x3n2 FnPQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ji7si943010ejc.451.2021.08.23.00.33.42; Mon, 23 Aug 2021 00:34:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234976AbhHWHeH (ORCPT + 99 others); Mon, 23 Aug 2021 03:34:07 -0400 Received: from mail2-relais-roc.national.inria.fr ([192.134.164.83]:53767 "EHLO mail2-relais-roc.national.inria.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234861AbhHWHeG (ORCPT ); Mon, 23 Aug 2021 03:34:06 -0400 IronPort-HdrOrdr: =?us-ascii?q?A9a23=3A7eIjsakUEYwYax48EGTddVtgDVTpDfIL3DAb?= =?us-ascii?q?v31ZSRFFG/Fw9vre4cjzuiWVtN98YhwdcJW7Scy9qBDnhOJICOsqTNSftWDd0Q?= =?us-ascii?q?PCRr2Kr7GSoQEIcBeQygcp78Zdmt9FZuEYY2IXsS/S2njeLz57qOP3lpxAzt2u?= =?us-ascii?q?q0uFBTsaEp2Jum9Ce32m+mUffng9OXIRfKDsnvZ6mw=3D=3D?= X-IronPort-AV: E=Sophos;i="5.84,326,1620684000"; d="scan'208";a="524806179" Received: from xanadu.blop.info ([178.79.145.134]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Aug 2021 09:33:22 +0200 Date: Mon, 23 Aug 2021 09:32:56 +0200 From: Lucas Nussbaum To: Herbert Xu Cc: Brijesh Singh , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, stable@kernel.org, Tom Lendacky , Joerg Roedel , David Rientjes Subject: Re: [PATCH] crypto: ccp: shutdown SEV firmware on kexec Message-ID: References: <20210728151521.5319-1-brijesh.singh@amd.com> <20210806121442.GB25554@gondor.apana.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20210806121442.GB25554@gondor.apana.org.au> Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 06/08/21 at 20:14 +0800, Herbert Xu wrote: > On Wed, Jul 28, 2021 at 10:15:21AM -0500, Brijesh Singh wrote: > > The commit 97f9ac3db6612 ("crypto: ccp - Add support for SEV-ES to the > > PSP driver") added support to allocate Trusted Memory Region (TMR) > > used during the SEV-ES firmware initialization. The TMR gets locked > > during the firmware initialization and unlocked during the shutdown. > > While the TMR is locked, access to it is disallowed. > > > > Currently, the CCP driver does not shutdown the firmware during the > > kexec reboot, leaving the TMR memory locked. > > > > Register a callback to shutdown the SEV firmware on the kexec boot. > > > > Fixes: 97f9ac3db6612 ("crypto: ccp - Add support for SEV-ES to the PSP driver") > > Reported-by: Lucas Nussbaum > > Tested-by: Lucas Nussbaum > > Cc: > > Cc: Tom Lendacky > > Cc: Joerg Roedel > > Cc: Herbert Xu > > Cc: David Rientjes > > Signed-off-by: Brijesh Singh > > --- > > drivers/crypto/ccp/sev-dev.c | 49 +++++++++++++++++------------------- > > drivers/crypto/ccp/sp-pci.c | 12 +++++++++ > > 2 files changed, 35 insertions(+), 26 deletions(-) > > Patch applied. Thanks. Could this be backported to 5.10 as well? Thanks -- Lucas Nussbaum +33 3 54 95 86 19 Responsable du programme plateformes d'exp?rimentation DDO-SDT - Direction G?n?rale D?l?gu?e ? l'Innovation - Inria