From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-dl1-f45.google.com (mail-dl1-f45.google.com [74.125.82.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 06C934048B3 for ; Fri, 15 May 2026 21:15:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.82.45 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778879734; cv=none; b=Fn+4F1wKl17TAqwZ5rktXp0csDMLg0R86qduF7MTaQX53r3tHYy/H1zRDAfmYyLuohPf8M6D7JQ/FBXzo941rmDdBUo5V6MC3jo+yq6Qq0v3C+/ea14eECXDupZ5JCtPo4WqYdHZgbTTF1xYEl1Naae5rB9aA4plLGWormjfc6g= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778879734; c=relaxed/simple; bh=ILT1qaKW78nRQkC/CMCLSzr2h8dTPOcGoDMHkPnSKzE=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Z9OyhjR63ixrI5ybHRrtV0Ggo9oh5A5dMo2O4d7TF8rkhfFqJMURybQ9Y/Ym0pQVnUhT380FJjQ1vo0NoHGTU+mdrONsL+q5KicYxCwGuE3XRcNRtTr6dhWoKPuCv+eONr6jRQMKGfZNipJtgzROeuaOiiyHhRBL7RA+ZBAY+Fo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=IYL3YWM0; arc=none smtp.client-ip=74.125.82.45 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="IYL3YWM0" Received: by mail-dl1-f45.google.com with SMTP id a92af1059eb24-12db2e415a7so135546c88.1 for ; Fri, 15 May 2026 14:15:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778879732; x=1779484532; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=aF0BH6dZpM5RACWLo6N4NcvxHw87HpE9a7jatFY2Xnk=; b=IYL3YWM0K72+PKBjUIotlkyudmp1jTzkcWSk+FsrFVXzSnegkXpcBDTHvkmgtyv013 1Fz+1cDxxzxpwH2cjTMD3XcK8OrL3KyPSBFqH8USMoVoBphH/PDfMppdjjf5WM9Uu+zw zdblTDDlg3ILJFwS88bKz+DpkkC4R874roDAz+B70ThKNQTz3lnAY6Vm18brrdmeKYlL nrRDow22yM9/5xyVwtbnB/WqwizcqZ8UTLFg96EIfVlIoQZejH3ZXpbdDCcTFwuaBYDe SBIe7CCRHOt+kHRuouqHqrJpRS0HE1SBm0toraK+5jwMRSnRo9h+dKmUj5IEOAw9IoLh DUQQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778879732; x=1779484532; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=aF0BH6dZpM5RACWLo6N4NcvxHw87HpE9a7jatFY2Xnk=; b=GDfXCFUCqnChAS0KJPbgzV3TPD7unKcccjPs4pHDQ5de+4oPapVcLq3eKLuPdNEcWS OtGVwPPBwpsx/HOn0JhPXriuWfdxw9+pUI4rmpMdyWKoMOtVUSGba4iSUn3akOkb83l+ n17st/LltNOKPmXMoKty5ttjKIDjS6HbGEFTBcROe7zbuO+a88KAwodiNTyV4o1yGI25 DkMNm6EDzO3X9gmh9wesj+FoHLq6mxsdFnHLIUFyuf9mM4pP8rZTAu16ZYRMuKWpEsp2 sp4+LLJzpT+ldcbcZdB7rxCeto9Wiz1JpE591vpke3+qKnDIZzWIoYF5rbijUkc5no3Y xmig== X-Forwarded-Encrypted: i=1; AFNElJ+vGgjfqtbR78PSon/Iq/Dyq1mTxD9+g+/7hcFtEycFvzQf+MoHpiro721IJ8RPoP/P0k8dTWAw7jg=@vger.kernel.org X-Gm-Message-State: AOJu0YymZebpCOVhFCo8AeTDS8qhAwjlHAd4BmPcsdwQbVy6AyOEskUc SIE1100Q0+geLd/nGF0rVVHk4NgFbp8/dNCvgDo0JG4MOZrIeLnCmFsr X-Gm-Gg: Acq92OGpFBTRvuREV6+4FxTO7Gr5VTBk6hSLQ+SWtwZiVOqLFMq+MhJj/TYy9yLXP06 dHyQqFe+qD/THDuCXRcGXDrQySviO3vGHQkfFdNbrwk53S3bczi6lBmPcYxLnF87en9YiArAMOe Ln79PjnwBRrcHUeazJ6lDA4HjwcpqrWQc6oVB71arlSuzuLGxi+jcA33Owa7dPlQMyDPlvLY57P MCN1NJAjLn4+DzqyBM9eNG6O8oFcmPf2pvURwWeeRzTb9ShA+xfmWj0DZzx4IpDIllJ9ZCyKT5c P6Ozq+rrfVH/AU/aDHp5afHBYQnrF2xgjbvljOuIYaYtB/wRsySv1L7QyXzRmWdNfO1Eu1IpF3X 34yjwNsussYiOjGgYuPVNXEww4pj65Ya1y0s/Bl+4fmX62iLdgR6+jPYiYfcCdjUt1W99QG8Aae p0naUJHTP20EZ28F6AEJsdRBUyuoBuyRvxsrlhKg62qA== X-Received: by 2002:a05:7022:6621:b0:134:a710:d908 with SMTP id a92af1059eb24-1350451887emr2398095c88.13.1778879732067; Fri, 15 May 2026 14:15:32 -0700 (PDT) Received: from mimas.lan ([2603:8000:df01:38f7:a6bb:6dff:fecf:e71a]) by smtp.gmail.com with ESMTPSA id a92af1059eb24-134cc33a618sm11245224c88.12.2026.05.15.14.15.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 May 2026 14:15:31 -0700 (PDT) From: Ross Philipson To: linux-kernel@vger.kernel.org, x86@kernel.org, linux-integrity@vger.kernel.org, linux-doc@vger.kernel.org, linux-crypto@vger.kernel.org, kexec@lists.infradead.org, linux-efi@vger.kernel.org, iommu@lists.linux.dev Cc: ross.philipson@gmail.com, dpsmith@apertussolutions.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, dave.hansen@linux.intel.com, ardb@kernel.org, mjg59@srcf.ucam.org, James.Bottomley@hansenpartnership.com, peterhuewe@gmx.de, jarkko@kernel.org, jgg@ziepe.ca, luto@amacapital.net, nivedita@alum.mit.edu, herbert@gondor.apana.org.au, davem@davemloft.net, corbet@lwn.net, ebiederm@xmission.com, dwmw2@infradead.org, baolu.lu@linux.intel.com, kanth.ghatraju@oracle.com, daniel.kiper@oracle.com, andrew.cooper3@citrix.com, trenchboot-devel@googlegroups.com Subject: [PATCH v16 28/38] x86: Add early SHA-384/512 support for Secure Launch early measurements Date: Fri, 15 May 2026 14:14:00 -0700 Message-ID: <20260515211410.31440-29-ross.philipson@gmail.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20260515211410.31440-1-ross.philipson@gmail.com> References: <20260515211410.31440-1-ross.philipson@gmail.com> Precedence: bulk X-Mailing-List: linux-doc@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: "Daniel P. Smith" On newer TPM 2 implementations, SHA 384 and 512 banks may be available for use. If these banks are enabled in firmware, they will be used for the Dynamic Launch. The DLME will also use these algorithms to measure configuration information into the TPM as early as possible before using the values. This implementation uses the established approach of #including the SHA-512 library directly in the early boot code. Signed-off-by: Daniel P. Smith Signed-off-by: Ross Philipson --- arch/x86/boot/startup/Makefile | 1 + arch/x86/boot/startup/lib-sha512.c | 6 ++++++ 2 files changed, 7 insertions(+) create mode 100644 arch/x86/boot/startup/lib-sha512.c diff --git a/arch/x86/boot/startup/Makefile b/arch/x86/boot/startup/Makefile index 071a90f23ae0..527cba7e4560 100644 --- a/arch/x86/boot/startup/Makefile +++ b/arch/x86/boot/startup/Makefile @@ -23,6 +23,7 @@ obj-$(CONFIG_AMD_MEM_ENCRYPT) += sme.o sev-startup.o slaunch-objs += lib-sha1.o slaunch-objs += lib-sha256.o +slaunch-objs += lib-sha512.o obj-$(CONFIG_SECURE_LAUNCH) += $(slaunch-objs) pi-objs := $(patsubst %.o,$(obj)/%.o,$(obj-y)) diff --git a/arch/x86/boot/startup/lib-sha512.c b/arch/x86/boot/startup/lib-sha512.c new file mode 100644 index 000000000000..2afd5c5935cd --- /dev/null +++ b/arch/x86/boot/startup/lib-sha512.c @@ -0,0 +1,6 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * Copyright (c) 2026 Apertus Solutions, LLC + */ + +#include "../../../../lib/crypto/sha512.c" -- 2.47.3