Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp3243101pxb; Mon, 1 Nov 2021 10:21:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwSvfP4/4L/9XNCU2Ern4yLikp0OTKfaS2JKkBpAtttqzMQ54z+Cw4uGqiXGx+Qrk/omqJ+ X-Received: by 2002:a92:c80d:: with SMTP id v13mr20968528iln.175.1635787309046; Mon, 01 Nov 2021 10:21:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635787309; cv=none; d=google.com; s=arc-20160816; b=SUfvOANQWxuIPOQetpBDiyIGddO4nQHB8y7N+Z/00g4f1tF0puBgnBcUBxoKK8MJl+ JFZ4c8hW7SdksSAtKtToOolmSCB0uty7TaAxcU3irAQBqbNbgclKUAwHvP7bEB8+ia8b gp+Iix93d6jEjyr44g4AJ1OPkJC5Tn8Ic6bGfaqFRXLixV90qPjiL86BXdYOflLgFHEZ ifay/CnFsOROVSAF00GJDAhk1+Wjgsfwhdf/nkMad6ayOpzWotIHfWSD3ukZw/pVibJG k/sQ5dqEnVwRLCwPryrYTcSY29G9n4Zn1VUQPiR7GdeQL7DkKGQbTy9gzqNnrXmzYMYy uUpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :dkim-signature; bh=CoWFdMtEKYfjPZOD0vCpNP+OWRXL2lmJCe48NdmadTg=; b=voomHbtxiT/nCI1UBRFtmH/09vSDqUKYi1AZNnCEVEcO6niKhEGyfwJeQyYCcglsYS 91xofI24koMia4FEpcxdVRZPXV+VNQtWUMkZN3HYSjw7uOClTydz6Lpl9cdTYmyj8Yjn zDgVd1ihWKg9BmmBgLB4C1cyHSQexTTHQzznbpRvWL8KoA0r1Y7yzUuBerEzZsMz5zpQ 55WjcRwUZDRFON9iEi5tAOATL/Hp1byw+MOLA2sZQDMnpTAXsP/mBJCXjAG9ouuhtjCn YChC9bBABoNjo1WRMay8dCHVAIM4LECSiBz4B3KTGbypYoVIaji8v1mgAfn/hGEbLJPd riTA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=gxe3023L; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q10si9132435ilo.65.2021.11.01.10.21.36; Mon, 01 Nov 2021 10:21:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=gxe3023L; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231348AbhKARYI (ORCPT + 99 others); Mon, 1 Nov 2021 13:24:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39192 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229725AbhKARYF (ORCPT ); Mon, 1 Nov 2021 13:24:05 -0400 Received: from mail-pj1-x1049.google.com (mail-pj1-x1049.google.com [IPv6:2607:f8b0:4864:20::1049]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4E90DC061764 for ; Mon, 1 Nov 2021 10:21:31 -0700 (PDT) Received: by mail-pj1-x1049.google.com with SMTP id jx2-20020a17090b46c200b001a62e9db321so326295pjb.7 for ; Mon, 01 Nov 2021 10:21:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:message-id:mime-version:subject:from:to:cc; bh=CoWFdMtEKYfjPZOD0vCpNP+OWRXL2lmJCe48NdmadTg=; b=gxe3023L4vM/f0BrrI+g4eczlr8eUSoK7OVP52Fd83Zx+/1xgnT7Xp760uYfL35mwZ eq1NLI0+GFpypCgLVs/5MwsEf3ic6o8mPUtoIdAmU9XkEtEF0FxGwo7bMi6ObOJSJ2pK 9OHqcsWxwig7sc5WSRIjhTiEocMjG3MFxA31Mrpg47eiMWCB2/obzVQ7X5YbvqpX+zWD QMB8wqsR4PfopDPbFzdXKxnE+kV6EKNIyu7vw/aUgMPE477bdrT3sO6jJ1F8N2pzXtSA uuk8vvyvyBg9fIlp+VnqRk3aeSfGUSrXrq95lIkbVlX6aRWm8diqdRaApcsyEI+YEXBH 6MhQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=CoWFdMtEKYfjPZOD0vCpNP+OWRXL2lmJCe48NdmadTg=; b=sMrJzeVewTnrOKKA6I98+M9pNOr1cGCYBxI4FJtSUvSUUk/2bEWA64KbRQf/O3Y8D8 FRbrryy60hfA9GdHgw29QBySVWtjn4fyYRRLrUGyek4k9SymoD9Hx3p8dWXpYGngRiuU 8+iQ154gcP/z+mlrH/u4+2kMsCYGG55Xk5Zb70QXG7aOrdUeZUV4+Drq4A4QB0KCby6V khTmPobrzJWp5ygPJF2PdvyWm115+KeYWWVv6gfZ2zybn3MJ40o+1u/1XMZOk1DUIsgD 4zv4Z7tPGY3cObK3rU5xIKkd3u2pEpeErrFwugOhjGvKESA2ZXqCJDkdGYzV+Bp59QTJ Tw5Q== X-Gm-Message-State: AOAM530GDFcGFIQPk7ZHhiqWxAM7KE+RQxuYPzk/3gA8igeZtFXnQapb QZ9DsuK4NCDtj/UEvVjWq491Xy7kJbw= X-Received: from pgonda1.kir.corp.google.com ([2620:15c:29:204:98c4:afe5:ed9f:d0db]) (user=pgonda job=sendgmr) by 2002:a62:8484:0:b0:481:5ff:48d6 with SMTP id k126-20020a628484000000b0048105ff48d6mr9475591pfd.78.1635787290687; Mon, 01 Nov 2021 10:21:30 -0700 (PDT) Date: Mon, 1 Nov 2021 10:21:23 -0700 Message-Id: <20211101172127.3060453-1-pgonda@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.33.1.1089.g2158813163f-goog Subject: [PATCH V2 0/4] Add SEV_INIT_EX support From: Peter Gonda To: thomas.lendacky@amd.com Cc: Peter Gonda , Marc Orr , David Rientjes , Brijesh Singh , Joerg Roedel , Herbert Xu , John Allen , "David S. Miller" , Paolo Bonzini , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org SEV_INIT requires users to unlock their SPI bus for the PSP's non volatile (NV) storage. Users may wish to lock their SPI bus for numerous reasons, to support this the PSP firmware supports SEV_INIT_EX. INIT_EX allows the firmware to use a region of memory for its NV storage leaving the kernel responsible for actually storing the data in a persistent way. This series adds a new module parameter to ccp allowing users to specify a path to a file for use as the PSP's NV storage. The ccp driver then reads the file into memory for the PSP to use and is responsible for writing the file whenever the PSP modifies the memory region. Signed-off-by: Peter Gonda Reviewed-by: Marc Orr Acked-by: David Rientjes Cc: Tom Lendacky Cc: Brijesh Singh Cc: Marc Orr Cc: Joerg Roedel Cc: Herbert Xu Cc: David Rientjes Cc: John Allen Cc: "David S. Miller" Cc: Paolo Bonzini Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org David Rientjes (1): crypto: ccp - Add SEV_INIT_EX support Peter Gonda (3): crypto: ccp - Fix SEV_INIT error logging on init crypto: ccp - Move SEV_INIT retry for corrupted data crypto: ccp - Refactor out sev_fw_alloc() .../virt/kvm/amd-memory-encryption.rst | 4 + drivers/crypto/ccp/sev-dev.c | 230 +++++++++++++++--- include/linux/psp-sev.h | 21 ++ 3 files changed, 222 insertions(+), 33 deletions(-) -- 2.33.1.1089.g2158813163f-goog