mirror of
https://github.com/torvalds/linux.git
synced 2026-04-18 14:53:58 -04:00
Merge tag 'v6.18-p1' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6
Pull crypto updates from Herbert Xu: "Drivers: - Add ciphertext hiding support to ccp - Add hashjoin, gather and UDMA data move features to hisilicon - Add lz4 and lz77_only to hisilicon - Add xilinx hwrng driver - Add ti driver with ecb/cbc aes support - Add ring buffer idle and command queue telemetry for GEN6 in qat Others: - Use rcu_dereference_all to stop false alarms in rhashtable - Fix CPU number wraparound in padata" * tag 'v6.18-p1' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6: (78 commits) dt-bindings: rng: hisi-rng: convert to DT schema crypto: doc - Add explicit title heading to API docs hwrng: ks-sa - fix division by zero in ks_sa_rng_init KEYS: X.509: Fix Basic Constraints CA flag parsing crypto: anubis - simplify return statement in anubis_mod_init crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs crypto: hisilicon/qm - clear all VF configurations in the hardware crypto: hisilicon - enable error reporting again crypto: hisilicon/qm - mask axi error before memory init crypto: hisilicon/qm - invalidate queues in use crypto: qat - Return pointer directly in adf_ctl_alloc_resources crypto: aspeed - Fix dma_unmap_sg() direction rhashtable: Use rcu_dereference_all and rcu_dereference_all_check crypto: comp - Use same definition of context alloc and free ops crypto: omap - convert from tasklet to BH workqueue crypto: qat - Replace kzalloc() + copy_from_user() with memdup_user() crypto: caam - double the entropy delay interval for retry padata: WQ_PERCPU added to alloc_workqueue users padata: replace use of system_unbound_wq with system_dfl_wq crypto: cryptd - WQ_PERCPU added to alloc_workqueue users ...
This commit is contained in:
@@ -249,6 +249,8 @@ static int sev_cmd_buffer_len(int cmd)
|
||||
case SEV_CMD_SNP_GUEST_REQUEST: return sizeof(struct sev_data_snp_guest_request);
|
||||
case SEV_CMD_SNP_CONFIG: return sizeof(struct sev_user_data_snp_config);
|
||||
case SEV_CMD_SNP_COMMIT: return sizeof(struct sev_data_snp_commit);
|
||||
case SEV_CMD_SNP_FEATURE_INFO: return sizeof(struct sev_data_snp_feature_info);
|
||||
case SEV_CMD_SNP_VLEK_LOAD: return sizeof(struct sev_user_data_snp_vlek_load);
|
||||
default: return 0;
|
||||
}
|
||||
|
||||
@@ -862,9 +864,10 @@ static int __sev_do_cmd_locked(int cmd, void *data, int *psp_ret)
|
||||
struct sev_device *sev;
|
||||
unsigned int cmdbuff_hi, cmdbuff_lo;
|
||||
unsigned int phys_lsb, phys_msb;
|
||||
unsigned int reg, ret = 0;
|
||||
unsigned int reg;
|
||||
void *cmd_buf;
|
||||
int buf_len;
|
||||
int ret = 0;
|
||||
|
||||
if (!psp || !psp->sev_data)
|
||||
return -ENODEV;
|
||||
@@ -1248,6 +1251,88 @@ static void snp_leak_hv_fixed_pages(void)
|
||||
1 << entry->order, false);
|
||||
}
|
||||
|
||||
bool sev_is_snp_ciphertext_hiding_supported(void)
|
||||
{
|
||||
struct psp_device *psp = psp_master;
|
||||
struct sev_device *sev;
|
||||
|
||||
if (!psp || !psp->sev_data)
|
||||
return false;
|
||||
|
||||
sev = psp->sev_data;
|
||||
|
||||
/*
|
||||
* Feature information indicates if CipherTextHiding feature is
|
||||
* supported by the SEV firmware and additionally platform status
|
||||
* indicates if CipherTextHiding feature is enabled in the
|
||||
* Platform BIOS.
|
||||
*/
|
||||
return ((sev->snp_feat_info_0.ecx & SNP_CIPHER_TEXT_HIDING_SUPPORTED) &&
|
||||
sev->snp_plat_status.ciphertext_hiding_cap);
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(sev_is_snp_ciphertext_hiding_supported);
|
||||
|
||||
static int snp_get_platform_data(struct sev_device *sev, int *error)
|
||||
{
|
||||
struct sev_data_snp_feature_info snp_feat_info;
|
||||
struct snp_feature_info *feat_info;
|
||||
struct sev_data_snp_addr buf;
|
||||
struct page *page;
|
||||
int rc;
|
||||
|
||||
/*
|
||||
* This function is expected to be called before SNP is
|
||||
* initialized.
|
||||
*/
|
||||
if (sev->snp_initialized)
|
||||
return -EINVAL;
|
||||
|
||||
buf.address = __psp_pa(&sev->snp_plat_status);
|
||||
rc = sev_do_cmd(SEV_CMD_SNP_PLATFORM_STATUS, &buf, error);
|
||||
if (rc) {
|
||||
dev_err(sev->dev, "SNP PLATFORM_STATUS command failed, ret = %d, error = %#x\n",
|
||||
rc, *error);
|
||||
return rc;
|
||||
}
|
||||
|
||||
sev->api_major = sev->snp_plat_status.api_major;
|
||||
sev->api_minor = sev->snp_plat_status.api_minor;
|
||||
sev->build = sev->snp_plat_status.build_id;
|
||||
|
||||
/*
|
||||
* Do feature discovery of the currently loaded firmware,
|
||||
* and cache feature information from CPUID 0x8000_0024,
|
||||
* sub-function 0.
|
||||
*/
|
||||
if (!sev->snp_plat_status.feature_info)
|
||||
return 0;
|
||||
|
||||
/*
|
||||
* Use dynamically allocated structure for the SNP_FEATURE_INFO
|
||||
* command to ensure structure is 8-byte aligned, and does not
|
||||
* cross a page boundary.
|
||||
*/
|
||||
page = alloc_page(GFP_KERNEL);
|
||||
if (!page)
|
||||
return -ENOMEM;
|
||||
|
||||
feat_info = page_address(page);
|
||||
snp_feat_info.length = sizeof(snp_feat_info);
|
||||
snp_feat_info.ecx_in = 0;
|
||||
snp_feat_info.feature_info_paddr = __psp_pa(feat_info);
|
||||
|
||||
rc = sev_do_cmd(SEV_CMD_SNP_FEATURE_INFO, &snp_feat_info, error);
|
||||
if (!rc)
|
||||
sev->snp_feat_info_0 = *feat_info;
|
||||
else
|
||||
dev_err(sev->dev, "SNP FEATURE_INFO command failed, ret = %d, error = %#x\n",
|
||||
rc, *error);
|
||||
|
||||
__free_page(page);
|
||||
|
||||
return rc;
|
||||
}
|
||||
|
||||
static int snp_filter_reserved_mem_regions(struct resource *rs, void *arg)
|
||||
{
|
||||
struct sev_data_range_list *range_list = arg;
|
||||
@@ -1278,7 +1363,7 @@ static int snp_filter_reserved_mem_regions(struct resource *rs, void *arg)
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int __sev_snp_init_locked(int *error)
|
||||
static int __sev_snp_init_locked(int *error, unsigned int max_snp_asid)
|
||||
{
|
||||
struct psp_device *psp = psp_master;
|
||||
struct sev_data_snp_init_ex data;
|
||||
@@ -1345,6 +1430,12 @@ static int __sev_snp_init_locked(int *error)
|
||||
snp_add_hv_fixed_pages(sev, snp_range_list);
|
||||
|
||||
memset(&data, 0, sizeof(data));
|
||||
|
||||
if (max_snp_asid) {
|
||||
data.ciphertext_hiding_en = 1;
|
||||
data.max_snp_asid = max_snp_asid;
|
||||
}
|
||||
|
||||
data.init_rmp = 1;
|
||||
data.list_paddr_en = 1;
|
||||
data.list_paddr = __psp_pa(snp_range_list);
|
||||
@@ -1468,7 +1559,7 @@ static int __sev_platform_init_locked(int *error)
|
||||
|
||||
sev = psp_master->sev_data;
|
||||
|
||||
if (sev->state == SEV_STATE_INIT)
|
||||
if (sev->sev_plat_status.state == SEV_STATE_INIT)
|
||||
return 0;
|
||||
|
||||
__sev_platform_init_handle_tmr(sev);
|
||||
@@ -1500,7 +1591,7 @@ static int __sev_platform_init_locked(int *error)
|
||||
return rc;
|
||||
}
|
||||
|
||||
sev->state = SEV_STATE_INIT;
|
||||
sev->sev_plat_status.state = SEV_STATE_INIT;
|
||||
|
||||
/* Prepare for first SEV guest launch after INIT */
|
||||
wbinvd_on_all_cpus();
|
||||
@@ -1538,10 +1629,10 @@ static int _sev_platform_init_locked(struct sev_platform_init_args *args)
|
||||
|
||||
sev = psp_master->sev_data;
|
||||
|
||||
if (sev->state == SEV_STATE_INIT)
|
||||
if (sev->sev_plat_status.state == SEV_STATE_INIT)
|
||||
return 0;
|
||||
|
||||
rc = __sev_snp_init_locked(&args->error);
|
||||
rc = __sev_snp_init_locked(&args->error, args->max_snp_asid);
|
||||
if (rc && rc != -ENODEV)
|
||||
return rc;
|
||||
|
||||
@@ -1575,7 +1666,7 @@ static int __sev_platform_shutdown_locked(int *error)
|
||||
|
||||
sev = psp->sev_data;
|
||||
|
||||
if (sev->state == SEV_STATE_UNINIT)
|
||||
if (sev->sev_plat_status.state == SEV_STATE_UNINIT)
|
||||
return 0;
|
||||
|
||||
ret = __sev_do_cmd_locked(SEV_CMD_SHUTDOWN, NULL, error);
|
||||
@@ -1585,7 +1676,7 @@ static int __sev_platform_shutdown_locked(int *error)
|
||||
return ret;
|
||||
}
|
||||
|
||||
sev->state = SEV_STATE_UNINIT;
|
||||
sev->sev_plat_status.state = SEV_STATE_UNINIT;
|
||||
dev_dbg(sev->dev, "SEV firmware shutdown\n");
|
||||
|
||||
return ret;
|
||||
@@ -1624,7 +1715,7 @@ static int snp_move_to_init_state(struct sev_issue_cmd *argp, bool *shutdown_req
|
||||
{
|
||||
int error, rc;
|
||||
|
||||
rc = __sev_snp_init_locked(&error);
|
||||
rc = __sev_snp_init_locked(&error, 0);
|
||||
if (rc) {
|
||||
argp->error = SEV_RET_INVALID_PLATFORM_STATE;
|
||||
return rc;
|
||||
@@ -1693,7 +1784,7 @@ static int sev_ioctl_do_pek_pdh_gen(int cmd, struct sev_issue_cmd *argp, bool wr
|
||||
if (!writable)
|
||||
return -EPERM;
|
||||
|
||||
if (sev->state == SEV_STATE_UNINIT) {
|
||||
if (sev->sev_plat_status.state == SEV_STATE_UNINIT) {
|
||||
rc = sev_move_to_init_state(argp, &shutdown_required);
|
||||
if (rc)
|
||||
return rc;
|
||||
@@ -1742,7 +1833,7 @@ static int sev_ioctl_do_pek_csr(struct sev_issue_cmd *argp, bool writable)
|
||||
data.len = input.length;
|
||||
|
||||
cmd:
|
||||
if (sev->state == SEV_STATE_UNINIT) {
|
||||
if (sev->sev_plat_status.state == SEV_STATE_UNINIT) {
|
||||
ret = sev_move_to_init_state(argp, &shutdown_required);
|
||||
if (ret)
|
||||
goto e_free_blob;
|
||||
@@ -1790,6 +1881,16 @@ static int sev_get_api_version(void)
|
||||
struct sev_user_data_status status;
|
||||
int error = 0, ret;
|
||||
|
||||
/*
|
||||
* Cache SNP platform status and SNP feature information
|
||||
* if SNP is available.
|
||||
*/
|
||||
if (cc_platform_has(CC_ATTR_HOST_SEV_SNP)) {
|
||||
ret = snp_get_platform_data(sev, &error);
|
||||
if (ret)
|
||||
return 1;
|
||||
}
|
||||
|
||||
ret = sev_platform_status(&status, &error);
|
||||
if (ret) {
|
||||
dev_err(sev->dev,
|
||||
@@ -1797,10 +1898,12 @@ static int sev_get_api_version(void)
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* Cache SEV platform status */
|
||||
sev->sev_plat_status = status;
|
||||
|
||||
sev->api_major = status.api_major;
|
||||
sev->api_minor = status.api_minor;
|
||||
sev->build = status.build;
|
||||
sev->state = status.state;
|
||||
|
||||
return 0;
|
||||
}
|
||||
@@ -2029,7 +2132,7 @@ static int sev_ioctl_do_pek_import(struct sev_issue_cmd *argp, bool writable)
|
||||
data.oca_cert_len = input.oca_cert_len;
|
||||
|
||||
/* If platform is not in INIT state then transition it to INIT */
|
||||
if (sev->state != SEV_STATE_INIT) {
|
||||
if (sev->sev_plat_status.state != SEV_STATE_INIT) {
|
||||
ret = sev_move_to_init_state(argp, &shutdown_required);
|
||||
if (ret)
|
||||
goto e_free_oca;
|
||||
@@ -2200,7 +2303,7 @@ static int sev_ioctl_do_pdh_export(struct sev_issue_cmd *argp, bool writable)
|
||||
|
||||
cmd:
|
||||
/* If platform is not in INIT state then transition it to INIT. */
|
||||
if (sev->state != SEV_STATE_INIT) {
|
||||
if (sev->sev_plat_status.state != SEV_STATE_INIT) {
|
||||
if (!writable) {
|
||||
ret = -EPERM;
|
||||
goto e_free_cert;
|
||||
|
||||
Reference in New Issue
Block a user