Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9EBDDC433F5 for ; Mon, 15 Nov 2021 18:20:56 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 85356634B7 for ; Mon, 15 Nov 2021 18:20:56 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236503AbhKOSWK (ORCPT ); Mon, 15 Nov 2021 13:22:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50044 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241203AbhKOSSq (ORCPT ); Mon, 15 Nov 2021 13:18:46 -0500 Received: from mail-pf1-x44a.google.com (mail-pf1-x44a.google.com [IPv6:2607:f8b0:4864:20::44a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0853DC03D781 for ; Mon, 15 Nov 2021 09:41:06 -0800 (PST) Received: by mail-pf1-x44a.google.com with SMTP id e7-20020aa798c7000000b004a254db7946so7135735pfm.17 for ; Mon, 15 Nov 2021 09:41:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:message-id:mime-version:subject:from:to:cc; bh=Eg6f2WJu5krQnu/y0o//GpBJ3T4ZfGNyV5od0jKQbGY=; b=X8N5SMfdAZTxXEeXWUHlFBXvvNmxy+tr/4oO/d8XIBKoypX8VrHqI9I7lBpZhPooCY X1yKjF1gENzLdSKgmRraBh0KneT8A5C3WhiKQ2oNXDaN0ux9UFNPuXYpqtEiKsY2cMvb ZorSjNq/UD6BbT5UrdlUMUJ5Eq12rIxJJ//Nq7/BluMjGIvwxIB5bRbZoWTJsIGBb9Vi 93AVdF7MT2Cvr9rhi1Hy32k+vdE/8fImgZcUqN3GFM6RnF5n+9EvodtG7SGrlQAE7azX Yvm+eyGxlF3bFHOQbYZSDH+tNDqZZaDj9TtnJlkCd0/Vzh5lLZjqNL4nRtzZavEUx2Hb omIA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=Eg6f2WJu5krQnu/y0o//GpBJ3T4ZfGNyV5od0jKQbGY=; b=Rf+J/6/PuO3ryr5igsBelXImO3S9umvAy99kjUOD8cTNSH9cOVdpFye8MdSa6tsk5i pD4RyGu30g4xnQ04x9mnYmNJCyjMtOitN6HdJvPyp8f6uOiSNtisJb0bb9yFgIr/LsoV wdQkJBSN3rKAEBJwlLHG+w7av+H2oCwYHVEZW/iU0HWnmZM63dIUldxHpsr0ROqae3+U EWQd0mirk0yXBd8dLXPRsltD1OIfBDl7m0qwIyidGcJc3J0LRaZxwemCvCMoaLUPi8BR yoA89TH50zfr32fSrCUMTqtpjtraLwg4+JLAt+X5Gy5tY7JFdwfHev0C9mgmr0I0k3cD SIBw== X-Gm-Message-State: AOAM533lCoDyDpAYsI84WjQtCi/vRrrLSQkCrFyWz2o1UDhnrva2M/qg dCyPFnI2Mh+kQgv4+yu+ZfohH+ydV5g= X-Google-Smtp-Source: ABdhPJz01E3rKYXQjaNe7gZpXqIOO3AD/+sHmr0XbWwZUjglzjAtmWpn6m82EpyoTVOfxAnk/2mjc2FpRqk= X-Received: from pgonda1.kir.corp.google.com ([2620:15c:29:204:9fb:192e:3671:218c]) (user=pgonda job=sendgmr) by 2002:aa7:9903:0:b0:49f:e368:4fc3 with SMTP id z3-20020aa79903000000b0049fe3684fc3mr35029520pff.1.1636998065416; Mon, 15 Nov 2021 09:41:05 -0800 (PST) Date: Mon, 15 Nov 2021 09:40:57 -0800 Message-Id: <20211115174102.2211126-1-pgonda@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.34.0.rc1.387.gb447b232ab-goog Subject: [PATCH V4 0/5] Add SEV_INIT_EX support From: Peter Gonda To: thomas.lendacky@amd.com Cc: Peter Gonda , Marc Orr , David Rientjes , Brijesh Singh , Joerg Roedel , Herbert Xu , John Allen , "David S. Miller" , Paolo Bonzini , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org SEV_INIT requires users to unlock their SPI bus for the PSP's non volatile (NV) storage. Users may wish to lock their SPI bus for numerous reasons, to support this the PSP firmware supports SEV_INIT_EX. INIT_EX allows the firmware to use a region of memory for its NV storage leaving the kernel responsible for actually storing the data in a persistent way. This series adds a new module parameter to ccp allowing users to specify a path to a file for use as the PSP's NV storage. The ccp driver then reads the file into memory for the PSP to use and is responsible for writing the file whenever the PSP modifies the memory region. V3 * Add another module parameter 'psp_init_on_probe' to allow for skipping PSP init on module init. * Fixes review comments from Sean. * Fixes missing error checking with file reading. * Removed setting 'error' to a set value in patch 1. Signed-off-by: Peter Gonda Reviewed-by: Marc Orr Acked-by: David Rientjes Cc: Tom Lendacky Cc: Brijesh Singh Cc: Marc Orr Cc: Joerg Roedel Cc: Herbert Xu Cc: David Rientjes Cc: John Allen Cc: "David S. Miller" Cc: Paolo Bonzini Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org David Rientjes (1): crypto: ccp - Add SEV_INIT_EX support Peter Gonda (4): crypto: ccp - Add SEV_INIT rc error logging on init crypto: ccp - Move SEV_INIT retry for corrupted data crypto: ccp - Refactor out sev_fw_alloc() crypto: ccp - Add psp_init_on_probe module parameter .../virt/kvm/amd-memory-encryption.rst | 6 + drivers/crypto/ccp/sev-dev.c | 258 +++++++++++++++--- include/linux/psp-sev.h | 21 ++ 3 files changed, 245 insertions(+), 40 deletions(-) -- 2.34.0.rc1.387.gb447b232ab-goog