Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp3195885pxb; Mon, 1 Nov 2021 09:31:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyrH5ia875SmRG2vpmRWHWohP3UWWvppoS63O9a66ITGMnS/xFRMWhF+zcR/fkLsmZL0mxS X-Received: by 2002:a92:c8c6:: with SMTP id c6mr12321685ilq.54.1635784318411; Mon, 01 Nov 2021 09:31:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635784318; cv=none; d=google.com; s=arc-20160816; b=i9+BumwywWuYAxZDDMrvx7MHFcnBduTxpUz8fjwQirOtHnkHLMYSaxqNhQCE91ZhWp 4rvzSJKDLyALmON70epjvktwYpwxkjThFy+I6l4yYGcxOZrFVZTaTU87BxSGufcvrnkS CBDcr20K8zZY2yqORb2dLEvtHkbdE4UQqa5ImavWCOQTkKPpNyiKbPfNq5UBU9uMPQp/ 5PnOJnk1nzAtPXySwOHFMuNNX9/09YjbY5q99JJR+/ap7DOQtB5EwkR840c5NMfKw6Mr brIwF5NwUonruZTlCY4AelrK1WIiAAhw4o88KeQUuHlohZsMP+tx18J1SO8FllczsVy0 46sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=RoxrbwXI/uzghbJByN0kudXg7vyA8QYSZFm4zmFhcvg=; b=0ME01GG/Bq0tJPHsyiqQvn08zWEyRA/JjRdpK1/kcMfCdsYTSZ35WisH0/+Sdz3pfx s/WacbCrD2Te+hehH+2rxgcde5M9DoiOajKrq8+icV4J8IcH7KDeuJO1BZk76f+gw/sh T4CKj1Bv0FTbjQLJsumqH79mvzRUETlyjLnUuUoHzcZhCc+QKPvSLo5IQrrodz/EQVeM HMML1MNFsoQ8BGhbzyZ9sCaJQNH4e3eQsLxpS0op3DBJWaozZtoh7naUeZUiuYw0Dp2Q utvi+6I7D/9eKiOVvJmUM/3BgAHkOs4YIn/HRnFFREDGKGdGpTKgrAfOu52mjm/xe8oY Mtfg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=KcxYFvFV; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a20si8023468iow.16.2021.11.01.09.31.45; Mon, 01 Nov 2021 09:31:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=KcxYFvFV; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232416AbhKAQeQ (ORCPT + 99 others); Mon, 1 Nov 2021 12:34:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56102 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232117AbhKAQeP (ORCPT ); Mon, 1 Nov 2021 12:34:15 -0400 Received: from mail-oo1-xc32.google.com (mail-oo1-xc32.google.com [IPv6:2607:f8b0:4864:20::c32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 64FE0C061764 for ; Mon, 1 Nov 2021 09:31:42 -0700 (PDT) Received: by mail-oo1-xc32.google.com with SMTP id w23-20020a4a9d17000000b002bb72fd39f3so4875100ooj.11 for ; Mon, 01 Nov 2021 09:31:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=RoxrbwXI/uzghbJByN0kudXg7vyA8QYSZFm4zmFhcvg=; b=KcxYFvFVS2aVhuqU5fCWKH/beck96M3XSdshLqzozu7Bm41PLb8HYXUH1r/VviksrA kwRieikyx2iuDGkrARVy5MxOzUBU9w2kvQOkwc9jr6AAzjzM3qbfeT52R2Swm1yXsaJF O5gYj8uh95VXdy68GKY60azTFUUPsfm1/d5o8SBmAurpNKF32P3QIHDcPy4Lg53cJfIr RkG9p1bQkB+JUsB3U9fkllhhZ2Y3+0MkAYRhQ7T4YeYlD2SgaVcdjSziwrOT2y2MJfVc IQyQdLIbC/5pvbKMuA3VCCVpnSgMn68ZAlIY9EIhKssYV9E5/qMGCex5rM6RpeejToON WT4A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=RoxrbwXI/uzghbJByN0kudXg7vyA8QYSZFm4zmFhcvg=; b=mZkEKAH8nLGcMDMRq2kDO8HWwTW9If+tWWqqsXUK2R/D4QC5eXwDvYbtT5TSfI7N4O soMOxzm7ocEValKnZ2MCHmwLMJ3RRMmaav8T3BAiONKFlmviYCksrl9QjHRbUCKyZoVT HSw7WFUNNqpVughuBcrIgr/48KA6K86fq34Nn3M1/jVCYtmhvvCyO6YQiu8JRBSOd+Wt 7IOF+f3LbrECsT7wWuW7LdJnwuCc7wz7DC2ZmEU4bo71JiR4despkVSTMsvG51hjXcY6 1KC7leeymRBLkyjHbUkSLWDLnvCkZhXvbzfaNWcbBxVIEZ0Nv8DQ7UUnMZ4zSwqVnhWq jCdw== X-Gm-Message-State: AOAM531NTrMg0LPPNo1G7/G+HwWgdrAtc0mucSLBdkANSfnjYXCBWdJX r8Gpy1lIrcWRHvGCqapWJGJ9TjfAMjLRQ+FgsZr2mg== X-Received: by 2002:a4a:dc1a:: with SMTP id p26mr19990397oov.6.1635784301540; Mon, 01 Nov 2021 09:31:41 -0700 (PDT) MIME-Version: 1.0 References: <20211028175749.1219188-1-pgonda@google.com> In-Reply-To: <20211028175749.1219188-1-pgonda@google.com> From: Marc Orr Date: Mon, 1 Nov 2021 09:31:30 -0700 Message-ID: Subject: Re: [PATCH 0/4] Add SEV_INIT_EX support To: Peter Gonda Cc: Thomas.Lendacky@amd.com, David Rientjes , Brijesh Singh , Joerg Roedel , Herbert Xu , John Allen , "David S. Miller" , Paolo Bonzini , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Thu, Oct 28, 2021 at 10:57 AM Peter Gonda wrote: > > SEV_INIT requires users to unlock their SPI bus for the PSP's non > volatile (NV) storage. Users may wish to lock their SPI bus for numerous > reasons, to support this the PSP firmware supports SEV_INIT_EX. INIT_EX > allows the firmware to use a region of memory for its NV storage leaving > the kernel responsible for actually storing the data in a persistent > way. This series adds a new module parameter to ccp allowing users to > specify a path to a file for use as the PSP's NV storage. The ccp driver > then reads the file into memory for the PSP to use and is responsible > for writing the file whenever the PSP modifies the memory region. > > Signed-off-by: Peter Gonda > Acked-by: David Rientjes > Cc: Tom Lendacky > Cc: Brijesh Singh > Cc: Marc Orr > Cc: Joerg Roedel > Cc: Herbert Xu > Cc: David Rientjes > Cc: John Allen > Cc: "David S. Miller" > Cc: Paolo Bonzini ( > Cc: linux-crypto@vger.kernel.org > Cc: linux-kernel@vger.kernel.org > > David Rientjes (1): > crypto: ccp - Add SEV_INIT_EX support > > Peter Gonda (3): > crypto: ccp - Fix SEV_INIT error logging on init > crypto: ccp - Move SEV_INIT retry for corrupted data > crypto: ccp - Refactor out sev_fw_alloc() > > drivers/crypto/ccp/sev-dev.c | 235 ++++++++++++++++++++++++++++++----- > include/linux/psp-sev.h | 21 ++++ > 2 files changed, 222 insertions(+), 34 deletions(-) > > -- > 2.33.1.1089.g2158813163f-goog > I've just replied with my Reviewed-by tag to all of the patches because I had reviewed the v1 internally, before Peter posted externally. Thank you, Tom, for the excellent reviews! I'm looking forward to seeing the v2 with all of this feedback incorporated.