Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1347249pxb; Fri, 22 Jan 2021 13:23:22 -0800 (PST) X-Google-Smtp-Source: ABdhPJx3PDUCzUbDl6Fsw4zLPqgosIewzuUdK8TgEuhs+hidOdFTHJVUApDa+rmpVY/a89jBPgx8 X-Received: by 2002:a17:906:d0c2:: with SMTP id bq2mr4218744ejb.1.1611350602008; Fri, 22 Jan 2021 13:23:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611350602; cv=none; d=google.com; s=arc-20160816; b=ubvzwIA4W/u/ALWy3M26FkMvjIOa70hKSow8+hbpOak8DEy3Vk20y3xdVsykOs2XI9 Tnqybo6zaW0+/wwLybsO0xNtCpWZLyp4v5g+6fspCe+1DEovkIReUCYy0Vb6RA8Y+SeP FSGsAiwCMsTo0x61QqBdia5mJqhYKv9sOGeb6IucwHEiLhiSWibfg7xTNsBG7srdVZLR 4Clt9kA5WxpN6tw5O4loxoZSZtYOE9eUeLwyAn/ZAf+rfWqvRBPbNAQBWNyLatwgmK5Z UBKza6B/C822+8h8y4Opqn51dJAQFiYkYCEBkTbx8o4dWXGn1vEsd7b7m39R5eSYfXFS ijmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:reply-to:sender:dkim-signature; bh=/ZkAZInrp/HESo6Je3L3thhbbn73G+oj93gKTic8EAM=; b=yc7b+hzKyAN5mwWB/nMYQplyJ4n4jSldcs2GqSf0MTkLl0p9XgCCSANAzsWP8fbowl 0ggQhE8Uz+lQJiZozlf9LAYcafaHH8KoJknsbpgDhXNbx3k0y8T+eytZ8p07LQcH8V6m OAIqJ8uXvT5O9HhHqVjYfNLi/LyhDVsitCVaCASIdur1nlMJwG2wOdorW9dcmI8MF66V tgqGnr9SrUIhflNnL9Rvfd1kXwNAFoDkpKlaCwxK98Ne/YKOKoacUFpJn7xVwdXmofaJ 3rNiJ6SAomL4AleVnNd2lspV++9dSOnu12g8jeZJW+y2uTdp85NWh0iLjqnRgLYoY6eZ pQhA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=JSL5W7nZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bx8si3321090ejb.664.2021.01.22.13.22.57; Fri, 22 Jan 2021 13:23:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=JSL5W7nZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730587AbhAVVWL (ORCPT + 99 others); Fri, 22 Jan 2021 16:22:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43804 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729674AbhAVU0A (ORCPT ); Fri, 22 Jan 2021 15:26:00 -0500 Received: from mail-yb1-xb49.google.com (mail-yb1-xb49.google.com [IPv6:2607:f8b0:4864:20::b49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1E975C0612F2 for ; Fri, 22 Jan 2021 12:22:10 -0800 (PST) Received: by mail-yb1-xb49.google.com with SMTP id w30so518842ybi.7 for ; Fri, 22 Jan 2021 12:22:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:reply-to:date:in-reply-to:message-id:mime-version:references :subject:from:to:cc; bh=/ZkAZInrp/HESo6Je3L3thhbbn73G+oj93gKTic8EAM=; b=JSL5W7nZXPziV3zGpE/mSde9BrCmdj9Rm9RRUxVfwJV6nSes7XQJaRD5B+ukF9Gscj QGUuhyPUwbks7K2GPKJ3P9aFjDeeZj+AV9dCr2jLc2TbbgpY4vd4oheClqgtpPDxqXPV kzKsHeRUlqONGMlDzuTCvUrdRkuEhHYrT4/cmZnGtDPdsK+rF7tufCo2L7FU9gcTlQe5 AmxEh7XZnMkwpzKVBvO6he6ncfS7DtDMXbmKfivYQvtvZHs5ALbCe8QnPrwEhnV8aIg7 x/cbrNA4sk/0nLJvGK3+ZGbEdMJsqhmJRLwuZU5hDlxLnbzG3t/YVpF/wRXOj+1yxURi x2kQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:reply-to:date:in-reply-to:message-id :mime-version:references:subject:from:to:cc; bh=/ZkAZInrp/HESo6Je3L3thhbbn73G+oj93gKTic8EAM=; b=VNqjJWhBKflKKaWSg1tF/OHmc+4jFk4l8zT+jfFDSi3Vc/w2SVBpMs7CmtwOu3jwA9 uFmNmhFkuHAuzIS5ndilqctPfNwbcM/tloC3WdkKj+oja+tXbtkXB/DS6jyUeJF6dNLR YSF+37VaClQNtlv+M/1KOID6kV8t98qlPu0k0uArGHrhXUHeHfZVzmjvlBcDNuKiQsgx eBpYRhJK8Jj4iW4Ej1Jfov375fhnxQZPQTG2fkwujCSV+A1hwpZ1cqyvupNWYgJd/Ycz RpMn+mYwi9Hm8wK9K2I0eGGT+EwGnPrX0XVW+3q8Iv2OEGZwUjj2VKmUI01Tp9CEfJyk PINw== X-Gm-Message-State: AOAM533ibxUBfF4AhKAGWvDKI5OIkfI3w/z8ozmjFsEvN9WPpAoP7XaK OWuzF5dvlVLSUkqt2Q6zkG8+ZPCXcYA= Sender: "seanjc via sendgmr" X-Received: from seanjc798194.pdx.corp.google.com ([2620:15c:f:10:1ea0:b8ff:fe73:50f5]) (user=seanjc job=sendgmr) by 2002:a25:5407:: with SMTP id i7mr9425875ybb.50.1611346929385; Fri, 22 Jan 2021 12:22:09 -0800 (PST) Reply-To: Sean Christopherson Date: Fri, 22 Jan 2021 12:21:38 -0800 In-Reply-To: <20210122202144.2756381-1-seanjc@google.com> Message-Id: <20210122202144.2756381-8-seanjc@google.com> Mime-Version: 1.0 References: <20210122202144.2756381-1-seanjc@google.com> X-Mailer: git-send-email 2.30.0.280.ga3ce27912f-goog Subject: [PATCH v3 07/13] KVM: SVM: Enable SEV/SEV-ES functionality by default (when supported) From: Sean Christopherson To: Paolo Bonzini , Dave Hansen , Andy Lutomirski , Peter Zijlstra Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Borislav Petkov , Tom Lendacky , Brijesh Singh Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Enable the 'sev' and 'sev_es' module params by default instead of having them conditioned on CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT. The extra Kconfig is pointless as KVM SEV/SEV-ES support is already controlled via CONFIG_KVM_AMD_SEV, and CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT has the unfortunate side effect of enabling all the SEV-ES _guest_ code due to it being dependent on CONFIG_AMD_MEM_ENCRYPT=y. Cc: Borislav Petkov Cc: Tom Lendacky Cc: Brijesh Singh Signed-off-by: Sean Christopherson --- arch/x86/kvm/svm/sev.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c index 2b8ebe2f1caf..75a83e2a8a89 100644 --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -29,11 +29,11 @@ #ifdef CONFIG_KVM_AMD_SEV /* enable/disable SEV support */ -static bool sev_enabled = IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT); +static bool sev_enabled = true; module_param_named(sev, sev_enabled, bool, 0444); /* enable/disable SEV-ES support */ -static bool sev_es_enabled = IS_ENABLED(CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT); +static bool sev_es_enabled = true; module_param_named(sev_es, sev_es_enabled, bool, 0444); #else #define sev_enabled false -- 2.30.0.280.ga3ce27912f-goog