diff options
author | Sean Christopherson <seanjc@google.com> | 2021-04-22 04:11:21 +0200 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2021-04-26 11:27:16 +0200 |
commit | 8cb756b7bdcc6e663a74dd0ca69ea143ff684494 (patch) | |
tree | cbde5e7f3a11b814ff8e7052f819089e36679389 /arch/x86/kvm | |
parent | KVM: SVM: Unconditionally invoke sev_hardware_teardown() (diff) | |
download | linux-8cb756b7bdcc6e663a74dd0ca69ea143ff684494.tar.xz linux-8cb756b7bdcc6e663a74dd0ca69ea143ff684494.zip |
KVM: SVM: Explicitly check max SEV ASID during sev_hardware_setup()
Query max_sev_asid directly after setting it instead of bouncing through
its wrapper, svm_sev_enabled(). Using the wrapper is unnecessary
obfuscation.
No functional change intended.
Reviewed by: Tom Lendacky <thomas.lendacky@amd.com>
Reviewed-by: Brijesh Singh <brijesh.singh@amd.com>
Signed-off-by: Sean Christopherson <seanjc@google.com>
Message-Id: <20210422021125.3417167-12-seanjc@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/kvm')
-rw-r--r-- | arch/x86/kvm/svm/sev.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c index a63768622bbf..84708d2dbc42 100644 --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -1842,8 +1842,7 @@ void __init sev_hardware_setup(void) /* Maximum number of encrypted guests supported simultaneously */ max_sev_asid = ecx; - - if (!svm_sev_enabled()) + if (!max_sev_asid) goto out; /* Minimum ASID value that should be used for SEV guest */ |