On 7/31/24 10:08, Nikunj A Dadhania wrote: > Currently, the SEV guest driver is the only user of SNP guest messaging. > All routines for initializing SNP guest messaging are implemented within > the SEV guest driver. To add Secure TSC guest support, these initialization > routines need to be available during early boot. > > Carve out common SNP guest messaging buffer allocations and message > initialization routines to core/sev.c and export them. These newly added > APIs set up the SNP message context (snp_msg_desc), which contains all the > necessary details for sending SNP guest messages. > > At present, the SEV guest platform data structure is used to pass the > secrets page physical address to SEV guest driver. Since the secrets page > address is locally available to the initialization routine, use the cached > address. Remove the unused SEV guest platform data structure. > > Signed-off-by: Nikunj A Dadhania <nikunj@xxxxxxx> Reviewed-by: Tom Lendacky <thomas.lendacky@xxxxxxx> > --- > arch/x86/include/asm/sev.h | 71 ++++++++- > arch/x86/coco/sev/core.c | 133 +++++++++++++++- > drivers/virt/coco/sev-guest/sev-guest.c | 194 +++--------------------- > 3 files changed, 213 insertions(+), 185 deletions(-) >