From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752529AbdJNJVy (ORCPT ); Sat, 14 Oct 2017 05:21:54 -0400 Received: from mail.skyhub.de ([5.9.137.197]:58650 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751950AbdJNJVw (ORCPT ); Sat, 14 Oct 2017 05:21:52 -0400 Date: Sat, 14 Oct 2017 11:21:39 +0200 From: Borislav Petkov To: Brijesh Singh Cc: x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Paolo Bonzini , Radim =?utf-8?B?S3LEjW3DocWZ?= , Joerg Roedel , Borislav Petkov , Tom Lendacky Subject: Re: [Part2 PATCH v5 17/31] KVM: SVM: Add KVM_SEV_INIT command Message-ID: <20171014092139.iw4mnrir52pket4n@pd.tnic> References: <20171004131412.13038-1-brijesh.singh@amd.com> <20171004131412.13038-18-brijesh.singh@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20171004131412.13038-18-brijesh.singh@amd.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 04, 2017 at 08:13:58AM -0500, Brijesh Singh wrote: > The command initializes the SEV platform context and allocates a new ASID > for this guest from the SEV ASID pool. The firmware must be initialized > before we issue any guest launch commands to create a new memory encryption > context. > > Cc: Thomas Gleixner > Cc: Ingo Molnar > Cc: "H. Peter Anvin" > Cc: Paolo Bonzini > Cc: "Radim Krčmář" > Cc: Joerg Roedel > Cc: Borislav Petkov > Cc: Tom Lendacky > Cc: x86@kernel.org > Cc: kvm@vger.kernel.org > Cc: linux-kernel@vger.kernel.org > Signed-off-by: Brijesh Singh > --- > arch/x86/include/asm/kvm_host.h | 7 ++ > arch/x86/kvm/svm.c | 189 +++++++++++++++++++++++++++++++++++++++- > 2 files changed, 195 insertions(+), 1 deletion(-) Just minor cleanups. With those applied: Reviewed-by: Borislav Petkov --- diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 26380627e7f9..7b3b199e15a1 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -1189,8 +1189,8 @@ static __init int svm_hardware_setup(void) static int sev_platform_get_state(int *state, int *error) { - int ret; struct sev_data_status *data; + int ret; data = kzalloc(sizeof(*data), GFP_KERNEL); if (!data) @@ -1201,7 +1201,7 @@ static int sev_platform_get_state(int *state, int *error) *state = data->state; pr_info_once("SEV firmware major %d minor %d build %d\n", - data->api_major, data->api_minor, data->build); + data->api_major, data->api_minor, data->build); kfree(data); return ret; @@ -5577,6 +5577,7 @@ static int sev_guest_init(struct kvm *kvm, struct kvm_sev_cmd *argp) sev->active = true; sev->asid = asid; + return 0; e_shutdown: @@ -5598,17 +5599,19 @@ static int svm_mem_enc_op(struct kvm *kvm, void __user *argp) mutex_lock(&kvm->lock); switch (sev_cmd.id) { - case KVM_SEV_INIT: { + case KVM_SEV_INIT: r = sev_guest_init(kvm, &sev_cmd); break; - } + default: break; } mutex_unlock(&kvm->lock); + if (copy_to_user(argp, &sev_cmd, sizeof(struct kvm_sev_cmd))) r = -EFAULT; + return r; } -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.