aboutsummaryrefslogtreecommitdiffstats
path: root/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch')
-rw-r--r--meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch181
1 files changed, 0 insertions, 181 deletions
diff --git a/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch
deleted file mode 100644
index 95399268..00000000
--- a/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch
+++ /dev/null
@@ -1,181 +0,0 @@
-From 90a5684ff341f0063e62171a8fbf5fb9baf28ce4 Mon Sep 17 00:00:00 2001
-From: Brijesh Singh <brijesh.singh@amd.com>
-Date: Mon, 4 Dec 2017 10:57:27 -0600
-Subject: [PATCH 24/95] crypto: ccp: Define SEV userspace ioctl and command id
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-Add a include file which defines the ioctl and command id used for
-issuing SEV platform management specific commands.
-
-Cc: Paolo Bonzini <pbonzini@redhat.com>
-Cc: "Radim Krčmář" <rkrcmar@redhat.com>
-Cc: Borislav Petkov <bp@suse.de>
-Cc: Herbert Xu <herbert@gondor.apana.org.au>
-Cc: Gary Hook <gary.hook@amd.com>
-Cc: Tom Lendacky <thomas.lendacky@amd.com>
-Cc: linux-crypto@vger.kernel.org
-Cc: kvm@vger.kernel.org
-Cc: linux-kernel@vger.kernel.org
-Improvements-by: Borislav Petkov <bp@suse.de>
-Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
-Reviewed-by: Borislav Petkov <bp@suse.de>
-Acked-by: Gary R Hook <gary.hook@amd.com>
-Signed-off-by: Sudheesh Mavila <sudheesh.mavila@amd.com>
----
- include/uapi/linux/psp-sev.h | 142 +++++++++++++++++++++++++++++++++++++++++++
- 1 file changed, 142 insertions(+)
- create mode 100644 include/uapi/linux/psp-sev.h
-
-diff --git a/include/uapi/linux/psp-sev.h b/include/uapi/linux/psp-sev.h
-new file mode 100644
-index 0000000..3d77fe9
---- /dev/null
-+++ b/include/uapi/linux/psp-sev.h
-@@ -0,0 +1,142 @@
-+/*
-+ * Userspace interface for AMD Secure Encrypted Virtualization (SEV)
-+ * platform management commands.
-+ *
-+ * Copyright (C) 2016-2017 Advanced Micro Devices, Inc.
-+ *
-+ * Author: Brijesh Singh <brijesh.singh@amd.com>
-+ *
-+ * SEV spec 0.14 is available at:
-+ * http://support.amd.com/TechDocs/55766_SEV-KM%20API_Specification.pdf
-+ *
-+ * This program is free software; you can redistribute it and/or modify
-+ * it under the terms of the GNU General Public License version 2 as
-+ * published by the Free Software Foundation.
-+ */
-+
-+#ifndef __PSP_SEV_USER_H__
-+#define __PSP_SEV_USER_H__
-+
-+#include <linux/types.h>
-+
-+/**
-+ * SEV platform commands
-+ */
-+enum {
-+ SEV_FACTORY_RESET = 0,
-+ SEV_PLATFORM_STATUS,
-+ SEV_PEK_GEN,
-+ SEV_PEK_CSR,
-+ SEV_PDH_GEN,
-+ SEV_PDH_CERT_EXPORT,
-+ SEV_PEK_CERT_IMPORT,
-+
-+ SEV_MAX,
-+};
-+
-+/**
-+ * SEV Firmware status code
-+ */
-+typedef enum {
-+ SEV_RET_SUCCESS = 0,
-+ SEV_RET_INVALID_PLATFORM_STATE,
-+ SEV_RET_INVALID_GUEST_STATE,
-+ SEV_RET_INAVLID_CONFIG,
-+ SEV_RET_INVALID_len,
-+ SEV_RET_ALREADY_OWNED,
-+ SEV_RET_INVALID_CERTIFICATE,
-+ SEV_RET_POLICY_FAILURE,
-+ SEV_RET_INACTIVE,
-+ SEV_RET_INVALID_ADDRESS,
-+ SEV_RET_BAD_SIGNATURE,
-+ SEV_RET_BAD_MEASUREMENT,
-+ SEV_RET_ASID_OWNED,
-+ SEV_RET_INVALID_ASID,
-+ SEV_RET_WBINVD_REQUIRED,
-+ SEV_RET_DFFLUSH_REQUIRED,
-+ SEV_RET_INVALID_GUEST,
-+ SEV_RET_INVALID_COMMAND,
-+ SEV_RET_ACTIVE,
-+ SEV_RET_HWSEV_RET_PLATFORM,
-+ SEV_RET_HWSEV_RET_UNSAFE,
-+ SEV_RET_UNSUPPORTED,
-+ SEV_RET_MAX,
-+} sev_ret_code;
-+
-+/**
-+ * struct sev_user_data_status - PLATFORM_STATUS command parameters
-+ *
-+ * @major: major API version
-+ * @minor: minor API version
-+ * @state: platform state
-+ * @flags: platform config flags
-+ * @build: firmware build id for API version
-+ * @guest_count: number of active guests
-+ */
-+struct sev_user_data_status {
-+ __u8 api_major; /* Out */
-+ __u8 api_minor; /* Out */
-+ __u8 state; /* Out */
-+ __u32 flags; /* Out */
-+ __u8 build; /* Out */
-+ __u32 guest_count; /* Out */
-+} __packed;
-+
-+/**
-+ * struct sev_user_data_pek_csr - PEK_CSR command parameters
-+ *
-+ * @address: PEK certificate chain
-+ * @length: length of certificate
-+ */
-+struct sev_user_data_pek_csr {
-+ __u64 address; /* In */
-+ __u32 length; /* In/Out */
-+} __packed;
-+
-+/**
-+ * struct sev_user_data_cert_import - PEK_CERT_IMPORT command parameters
-+ *
-+ * @pek_address: PEK certificate chain
-+ * @pek_len: length of PEK certificate
-+ * @oca_address: OCA certificate chain
-+ * @oca_len: length of OCA certificate
-+ */
-+struct sev_user_data_pek_cert_import {
-+ __u64 pek_cert_address; /* In */
-+ __u32 pek_cert_len; /* In */
-+ __u64 oca_cert_address; /* In */
-+ __u32 oca_cert_len; /* In */
-+} __packed;
-+
-+/**
-+ * struct sev_user_data_pdh_cert_export - PDH_CERT_EXPORT command parameters
-+ *
-+ * @pdh_address: PDH certificate address
-+ * @pdh_len: length of PDH certificate
-+ * @cert_chain_address: PDH certificate chain
-+ * @cert_chain_len: length of PDH certificate chain
-+ */
-+struct sev_user_data_pdh_cert_export {
-+ __u64 pdh_cert_address; /* In */
-+ __u32 pdh_cert_len; /* In/Out */
-+ __u64 cert_chain_address; /* In */
-+ __u32 cert_chain_len; /* In/Out */
-+} __packed;
-+
-+/**
-+ * struct sev_issue_cmd - SEV ioctl parameters
-+ *
-+ * @cmd: SEV commands to execute
-+ * @opaque: pointer to the command structure
-+ * @error: SEV FW return code on failure
-+ */
-+struct sev_issue_cmd {
-+ __u32 cmd; /* In */
-+ __u64 data; /* In */
-+ __u32 error; /* Out */
-+} __packed;
-+
-+#define SEV_IOC_TYPE 'S'
-+#define SEV_ISSUE_CMD _IOWR(SEV_IOC_TYPE, 0x0, struct sev_issue_cmd)
-+
-+#endif /* __PSP_USER_SEV_H */
---
-2.7.4
-