Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp9095330pxu; Mon, 28 Dec 2020 06:31:33 -0800 (PST) X-Google-Smtp-Source: ABdhPJzX80D2vR0+e+UcwRInl/rDiJp9SklixLQv4Ur5ekEus6lDBHkTEz12XsKIMr3rUPoj4Lln X-Received: by 2002:aa7:d74d:: with SMTP id a13mr42995839eds.78.1609165893612; Mon, 28 Dec 2020 06:31:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1609165893; cv=none; d=google.com; s=arc-20160816; b=YwjPnXWl6qEqnSyZalPw7b/1IWmrO7Nth+XGVFUKRY8qHHDdRI7fqKbLZFo0abJ9r5 VWjq3pbAKr1qxXZm4SVRB7cCKdSQ52QKjw4CNl+680WB/chTaP9TKdgrowUqL0eCKMQy xnmdsH6q3erIR+3kUBMXNwKtazuSnytWg9jaFJNZ9z8c7nZwQGvOEAAZOe+9gum6lCTF Ua/F3Ru/fS0KITA5f6ctkmLikfMMhficuRpGXZGrQAkITnhr4e7Jjrykp4Vw7MYjaYLf 75/yDpLeWwdBXfzWtwR9zVCi4IYGFAwhXQW43edHK0/jBfjtmS6rs/dVmlDDB1FGJvsy nMPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ES6lthw9rRnNFabfYij/Ko08OJkEC2+sDp4o19ZmGmo=; b=ccQj1nhtO4+Qa30rHThCNKCwpKDrdkQLQCnlmu/rOD9uzbrHIxO/UAEDGPfgh9zVpk r5YdXs6yxee5ybhRdLqZsSXFhaW684Vfgufc9fvskuRQaoLNEZtclhCxdKozpbijHdL+ Asf2lJ0ponBmFsAGBVvnvomMVJCrFxh+VmWyhq8sw8WatK2oxwQDuIBJG6NdVQx26NFp APzWKoP2xoWO78Jafbg+mMzRW+QYR1tkqb2qrRRzbv4t3AIc2VAK5yytBCnr9c42/CO2 wb7PFhAtyTO+i9j+/3wZGL3YWsGU92RoHVT0il2CS2adEAkClX0iJusgqmrJ3fN0Yr1h CLyg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=zQi0Da7a; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rv27si17926664ejb.720.2020.12.28.06.31.11; Mon, 28 Dec 2020 06:31:33 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=zQi0Da7a; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2502301AbgL1O2I (ORCPT + 99 others); Mon, 28 Dec 2020 09:28:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:35572 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2502253AbgL1O1v (ORCPT ); Mon, 28 Dec 2020 09:27:51 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 3DD6122B45; Mon, 28 Dec 2020 14:27:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1609165630; bh=9Y+GB9T/BkLl75B8lh9AlbmTY11GfxqCcR4U2fuvGdg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zQi0Da7a2dccsXg6WlGwFyMBX934CTnogO5KFGP3Rt3eHb2jkJqEHjsW+Zx92ZFas m+1b+v5JNeEPeZ+dsWhTzuyY9zmGxCZUem1XpdHnmBs95/gUKIvJcL9odrxwN3XJ5O hNTipJFJ853cp0Xf88AWYnY1YHQu7YU4BGVoPGns= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tom Lendacky , Paolo Bonzini Subject: [PATCH 5.10 599/717] KVM: SVM: Remove the call to sev_platform_status() during setup Date: Mon, 28 Dec 2020 13:49:57 +0100 Message-Id: <20201228125049.605150382@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201228125020.963311703@linuxfoundation.org> References: <20201228125020.963311703@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tom Lendacky commit 9d4747d02376aeb8de38afa25430de79129c5799 upstream. When both KVM support and the CCP driver are built into the kernel instead of as modules, KVM initialization can happen before CCP initialization. As a result, sev_platform_status() will return a failure when it is called from sev_hardware_setup(), when this isn't really an error condition. Since sev_platform_status() doesn't need to be called at this time anyway, remove the invocation from sev_hardware_setup(). Signed-off-by: Tom Lendacky Message-Id: <618380488358b56af558f2682203786f09a49483.1607620209.git.thomas.lendacky@amd.com> Cc: stable@vger.kernel.org Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/svm/sev.c | 22 +--------------------- 1 file changed, 1 insertion(+), 21 deletions(-) --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -1127,9 +1127,6 @@ void sev_vm_destroy(struct kvm *kvm) int __init sev_hardware_setup(void) { - struct sev_user_data_status *status; - int rc; - /* Maximum number of encrypted guests supported simultaneously */ max_sev_asid = cpuid_ecx(0x8000001F); @@ -1148,26 +1145,9 @@ int __init sev_hardware_setup(void) if (!sev_reclaim_asid_bitmap) return 1; - status = kmalloc(sizeof(*status), GFP_KERNEL); - if (!status) - return 1; - - /* - * Check SEV platform status. - * - * PLATFORM_STATUS can be called in any state, if we failed to query - * the PLATFORM status then either PSP firmware does not support SEV - * feature or SEV firmware is dead. - */ - rc = sev_platform_status(status, NULL); - if (rc) - goto err; - pr_info("SEV supported\n"); -err: - kfree(status); - return rc; + return 0; } void sev_hardware_teardown(void)