Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp1450774rwb; Fri, 19 Aug 2022 04:05:12 -0700 (PDT) X-Google-Smtp-Source: AA6agR6Tyu4eHzgF692ES+cnnaioGLAL+mLY5wHrM0M6ZNIbHlgbihboB5iYZSF6a6u1kNjSD7ry X-Received: by 2002:a17:906:8474:b0:730:7f7f:e49 with SMTP id hx20-20020a170906847400b007307f7f0e49mr4496780ejc.164.1660907111857; Fri, 19 Aug 2022 04:05:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660907111; cv=none; d=google.com; s=arc-20160816; b=EdiZUvvJRyxuSXnTgCJLbmtr5Bmv2RxMcJeL1qnYvC7Cwnmq1SE11TnKRdKkiheyM+ U9FwVtv91E/X5MOXkIl9Iu+i6iuvfj3mCT+dJnjReDzOD5N78jvxHG03wPSzxjiyzjCA NN5LNk9j1W/1FOnXulZf7XITCjcolXSTQpG0BCkIERjBexjAu6sdfxIGaiwC+QwoZZy/ weRHt7NVSUrQr/U6nNXt9VaIsdTu/xd2eCTFqFgvMa9biCD9+EK9oJJ8xizAa6hkVdxx VJzDK4B84W+3sGCm1JHRCxTgJEBZ5evt46tEWoUlF2EyKxQL2k4bqSPHAsle29UkaFWO AqbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=cCY9PqFzTnEBp4rWJjWMXkXWLBuvQgHtLG1bqZvFhbw=; b=VUxUYpQom1cA9DeF6AU7l8aHHsLIb/YEmvc2x1s1opRjukFf0GcTOVZWPgww8By1ys /jymLe53qApQKZ1b6aejtSJryIK2KIVZgXGMiKEffqx0XuQVit0HWNLF7/sEyjrAd1Ax j7x6hMqHoQOHcFBh9zrqtzAvjMuOlKSBl/VuWlIhuLgREmtN8MKe5/0BdHbtzSTerFAL iyftkOnAPLEQSfpC+82woWgPoWz7vOCz8G1BJatw+lHORRbJu712XTYWMc41UaoV8u1U DrfA55c41BxxcE+wGjqd/P4LR1iNZ8H/getDMQgAI6Cl0eGrAjkA8i2V1kXY07Ga/05D cmqA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nb29-20020a1709071c9d00b007317274bb0dsi3096649ejc.979.2022.08.19.04.04.45; Fri, 19 Aug 2022 04:05:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347895AbiHSLDO (ORCPT + 99 others); Fri, 19 Aug 2022 07:03:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43886 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1348499AbiHSLDM (ORCPT ); Fri, 19 Aug 2022 07:03:12 -0400 Received: from fornost.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3F457211; Fri, 19 Aug 2022 04:03:10 -0700 (PDT) Received: from gwarestrin.arnor.me.apana.org.au ([192.168.103.7]) by fornost.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1oOzmF-00CpeN-BV; Fri, 19 Aug 2022 21:03:00 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 19 Aug 2022 19:02:59 +0800 Date: Fri, 19 Aug 2022 19:02:59 +0800 From: Herbert Xu To: Jarkko Sakkinen Cc: Paolo Bonzini , Tom Lendacky , Jarkko Sakkinen , Harald Hoyer , Brijesh Singh , John Allen , "David S. Miller" , "open list:AMD CRYPTOGRAPHIC COPROCESSOR (CCP) DRIVER - SE..." , open list Subject: Re: [PATCH v2] crypto: ccp: Add a quirk to firmware update Message-ID: References: <20220809224915.92111-1-jarkko@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220809224915.92111-1-jarkko@kernel.org> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, Aug 10, 2022 at 01:49:15AM +0300, Jarkko Sakkinen wrote: > From: Jarkko Sakkinen > > A quirk for fixing the committed TCB version, when upgrading from a > firmware version earlier than 1.50. This is a known issue, and the > documented workaround is to load the firmware twice. > > Currently, this issue requires the following workaround: > > sudo modprobe -r kvm_amd > sudo modprobe -r ccp > sudo modprobe ccp > sudo modprobe kvm_amd > > Implement this workaround inside kernel by checking whether the API > version is less than 1.50, and if so, download the firmware twice. > This addresses the TCB version issue. > > Link: https://lore.kernel.org/all/de02389f-249d-f565-1136-4af3655fab2a@profian.com/ > Reported-by: Harald Hoyer > Signed-off-by: Jarkko Sakkinen > --- > v2: > - Updated the commit message and comments. > https://lore.kernel.org/all/0a3a790d-989f-2f76-f636-62fbd925a776@amd.com/ > drivers/crypto/ccp/sev-dev.c | 16 ++++++++++++++-- > 1 file changed, 14 insertions(+), 2 deletions(-) Patch applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt