Lines Matching defs:request
49 /* request and response are in unencrypted memory */
50 struct snp_guest_msg *request, *response;
88 * are two options. Either retry the exact same encrypted request or discontinue
101 * will reject the request.
129 * The message sequence counter for the SNP guest request is a 64-bit
134 * invalid number and will fail the message request.
137 dev_err(snp_dev->dev, "request message sequence counter overflow\n");
334 dev_dbg(snp_dev->dev, "request [seqno %lld type %d version %d sz %d]\n",
350 * Call firmware to process the request. In this function the encrypted
359 * If the extended guest request fails due to having too
361 * guest request without the extended data request in
370 * request buffer size was too small and give the caller the
386 * The host may return SNP_GUEST_VMM_ERR_BUSY if the request has been
411 * If an extended guest request was issued and the supplied certificate
412 * buffer was not large enough, a standard guest request was issued to
413 * prevent IV reuse. If the standard request was successful, return -EIO
448 * Write the fully encrypted request to the shared unencrypted
449 * request page.
451 memcpy(snp_dev->request, &snp_dev->secret_request,
461 "Detected error from ASP request. rc: %d, exitinfo2: 0x%llx\n",
586 * is used in the guest request message to get the certs blob from
796 /* Allocate the shared page used for the request and response message. */
797 snp_dev->request = alloc_shared_pages(dev, sizeof(struct snp_guest_msg));
798 if (!snp_dev->request)
819 /* initial the input address for guest request */
820 snp_dev->input.req_gpa = __pa(snp_dev->request);
836 free_shared_pages(snp_dev->request, sizeof(struct snp_guest_msg));
848 free_shared_pages(snp_dev->request, sizeof(struct snp_guest_msg));