diff options
Diffstat (limited to 'meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch')
-rw-r--r-- | meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch | 181 |
1 files changed, 181 insertions, 0 deletions
diff --git a/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch new file mode 100644 index 00000000..95399268 --- /dev/null +++ b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71-e3000/0024-crypto-ccp-Define-SEV-userspace-ioctl-and-command-id.patch @@ -0,0 +1,181 @@ +From 90a5684ff341f0063e62171a8fbf5fb9baf28ce4 Mon Sep 17 00:00:00 2001 +From: Brijesh Singh <brijesh.singh@amd.com> +Date: Mon, 4 Dec 2017 10:57:27 -0600 +Subject: [PATCH 24/95] crypto: ccp: Define SEV userspace ioctl and command id +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +Add a include file which defines the ioctl and command id used for +issuing SEV platform management specific commands. + +Cc: Paolo Bonzini <pbonzini@redhat.com> +Cc: "Radim Krčmář" <rkrcmar@redhat.com> +Cc: Borislav Petkov <bp@suse.de> +Cc: Herbert Xu <herbert@gondor.apana.org.au> +Cc: Gary Hook <gary.hook@amd.com> +Cc: Tom Lendacky <thomas.lendacky@amd.com> +Cc: linux-crypto@vger.kernel.org +Cc: kvm@vger.kernel.org +Cc: linux-kernel@vger.kernel.org +Improvements-by: Borislav Petkov <bp@suse.de> +Signed-off-by: Brijesh Singh <brijesh.singh@amd.com> +Reviewed-by: Borislav Petkov <bp@suse.de> +Acked-by: Gary R Hook <gary.hook@amd.com> +Signed-off-by: Sudheesh Mavila <sudheesh.mavila@amd.com> +--- + include/uapi/linux/psp-sev.h | 142 +++++++++++++++++++++++++++++++++++++++++++ + 1 file changed, 142 insertions(+) + create mode 100644 include/uapi/linux/psp-sev.h + +diff --git a/include/uapi/linux/psp-sev.h b/include/uapi/linux/psp-sev.h +new file mode 100644 +index 0000000..3d77fe9 +--- /dev/null ++++ b/include/uapi/linux/psp-sev.h +@@ -0,0 +1,142 @@ ++/* ++ * Userspace interface for AMD Secure Encrypted Virtualization (SEV) ++ * platform management commands. ++ * ++ * Copyright (C) 2016-2017 Advanced Micro Devices, Inc. ++ * ++ * Author: Brijesh Singh <brijesh.singh@amd.com> ++ * ++ * SEV spec 0.14 is available at: ++ * http://support.amd.com/TechDocs/55766_SEV-KM%20API_Specification.pdf ++ * ++ * This program is free software; you can redistribute it and/or modify ++ * it under the terms of the GNU General Public License version 2 as ++ * published by the Free Software Foundation. ++ */ ++ ++#ifndef __PSP_SEV_USER_H__ ++#define __PSP_SEV_USER_H__ ++ ++#include <linux/types.h> ++ ++/** ++ * SEV platform commands ++ */ ++enum { ++ SEV_FACTORY_RESET = 0, ++ SEV_PLATFORM_STATUS, ++ SEV_PEK_GEN, ++ SEV_PEK_CSR, ++ SEV_PDH_GEN, ++ SEV_PDH_CERT_EXPORT, ++ SEV_PEK_CERT_IMPORT, ++ ++ SEV_MAX, ++}; ++ ++/** ++ * SEV Firmware status code ++ */ ++typedef enum { ++ SEV_RET_SUCCESS = 0, ++ SEV_RET_INVALID_PLATFORM_STATE, ++ SEV_RET_INVALID_GUEST_STATE, ++ SEV_RET_INAVLID_CONFIG, ++ SEV_RET_INVALID_len, ++ SEV_RET_ALREADY_OWNED, ++ SEV_RET_INVALID_CERTIFICATE, ++ SEV_RET_POLICY_FAILURE, ++ SEV_RET_INACTIVE, ++ SEV_RET_INVALID_ADDRESS, ++ SEV_RET_BAD_SIGNATURE, ++ SEV_RET_BAD_MEASUREMENT, ++ SEV_RET_ASID_OWNED, ++ SEV_RET_INVALID_ASID, ++ SEV_RET_WBINVD_REQUIRED, ++ SEV_RET_DFFLUSH_REQUIRED, ++ SEV_RET_INVALID_GUEST, ++ SEV_RET_INVALID_COMMAND, ++ SEV_RET_ACTIVE, ++ SEV_RET_HWSEV_RET_PLATFORM, ++ SEV_RET_HWSEV_RET_UNSAFE, ++ SEV_RET_UNSUPPORTED, ++ SEV_RET_MAX, ++} sev_ret_code; ++ ++/** ++ * struct sev_user_data_status - PLATFORM_STATUS command parameters ++ * ++ * @major: major API version ++ * @minor: minor API version ++ * @state: platform state ++ * @flags: platform config flags ++ * @build: firmware build id for API version ++ * @guest_count: number of active guests ++ */ ++struct sev_user_data_status { ++ __u8 api_major; /* Out */ ++ __u8 api_minor; /* Out */ ++ __u8 state; /* Out */ ++ __u32 flags; /* Out */ ++ __u8 build; /* Out */ ++ __u32 guest_count; /* Out */ ++} __packed; ++ ++/** ++ * struct sev_user_data_pek_csr - PEK_CSR command parameters ++ * ++ * @address: PEK certificate chain ++ * @length: length of certificate ++ */ ++struct sev_user_data_pek_csr { ++ __u64 address; /* In */ ++ __u32 length; /* In/Out */ ++} __packed; ++ ++/** ++ * struct sev_user_data_cert_import - PEK_CERT_IMPORT command parameters ++ * ++ * @pek_address: PEK certificate chain ++ * @pek_len: length of PEK certificate ++ * @oca_address: OCA certificate chain ++ * @oca_len: length of OCA certificate ++ */ ++struct sev_user_data_pek_cert_import { ++ __u64 pek_cert_address; /* In */ ++ __u32 pek_cert_len; /* In */ ++ __u64 oca_cert_address; /* In */ ++ __u32 oca_cert_len; /* In */ ++} __packed; ++ ++/** ++ * struct sev_user_data_pdh_cert_export - PDH_CERT_EXPORT command parameters ++ * ++ * @pdh_address: PDH certificate address ++ * @pdh_len: length of PDH certificate ++ * @cert_chain_address: PDH certificate chain ++ * @cert_chain_len: length of PDH certificate chain ++ */ ++struct sev_user_data_pdh_cert_export { ++ __u64 pdh_cert_address; /* In */ ++ __u32 pdh_cert_len; /* In/Out */ ++ __u64 cert_chain_address; /* In */ ++ __u32 cert_chain_len; /* In/Out */ ++} __packed; ++ ++/** ++ * struct sev_issue_cmd - SEV ioctl parameters ++ * ++ * @cmd: SEV commands to execute ++ * @opaque: pointer to the command structure ++ * @error: SEV FW return code on failure ++ */ ++struct sev_issue_cmd { ++ __u32 cmd; /* In */ ++ __u64 data; /* In */ ++ __u32 error; /* Out */ ++} __packed; ++ ++#define SEV_IOC_TYPE 'S' ++#define SEV_ISSUE_CMD _IOWR(SEV_IOC_TYPE, 0x0, struct sev_issue_cmd) ++ ++#endif /* __PSP_USER_SEV_H */ +-- +2.7.4 + |