From: "Tycho Andersen (AMD)" <[email protected]> The PLATYPUS (https://platypusattack.com/platypus.pdf) attack paper offers method for exfiltration via a low-resolution side channel using Running Average Power Limit. Newer versions of the SEV firmware offer a way to freeze these counters while initialized, so export this as an option.
Changes from v1: * add a blurb from the platypus attack paper about the side channel * move the kernel parameter from the ccp driver to kvm_amd to make it more obvious * split off the SEV-ES feature detection into its own series: https://lore.kernel.org/all/[email protected]/ v1 is here: https://lore.kernel.org/all/[email protected]/ Tycho Andersen (AMD) (4): crypto/ccp: Pass init_args to __sev_snp_init_locked() crypto/ccp: Support setting RAPL_DIS in SNP_INIT_EX KVM: SEV: Add the kvm-amd.rapl_disable module parameter KVM: selftests: Add a smoke test support for RAPL_DIS .../admin-guide/kernel-parameters.txt | 5 +++ arch/x86/kvm/svm/sev.c | 8 +++++ drivers/crypto/ccp/sev-dev.c | 35 +++++++++++++------ include/linux/psp-sev.h | 2 ++ tools/testing/selftests/kvm/include/x86/sev.h | 1 + .../selftests/kvm/x86/sev_smoke_test.c | 24 ++++++++++++- 6 files changed, 63 insertions(+), 12 deletions(-) base-commit: 39f1c201b93f4ff71631bac72cff6eb155f976a4 -- 2.53.0

