[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <cbde7112ba635b6a2d7bab951b7c107f55c1a9ee.camel@infradead.org>
Date: Wed, 08 Mar 2023 12:19:40 +0000
From: David Woodhouse <dwmw2@...radead.org>
To: David Laight <David.Laight@...LAB.COM>,
Tom Lendacky <thomas.lendacky@....com>,
Usama Arif <usama.arif@...edance.com>,
"tglx@...utronix.de" <tglx@...utronix.de>,
"Phillips, Kim" <kim.phillips@....com>,
"brgerst@...il.com" <brgerst@...il.com>,
"Rapan, Sabin" <sabrapan@...zon.com>
Cc: "piotrgorski@...hyos.org" <piotrgorski@...hyos.org>,
"oleksandr@...alenko.name" <oleksandr@...alenko.name>,
"arjan@...ux.intel.com" <arjan@...ux.intel.com>,
"mingo@...hat.com" <mingo@...hat.com>,
"bp@...en8.de" <bp@...en8.de>,
"dave.hansen@...ux.intel.com" <dave.hansen@...ux.intel.com>,
"hpa@...or.com" <hpa@...or.com>, "x86@...nel.org" <x86@...nel.org>,
"pbonzini@...hat.com" <pbonzini@...hat.com>,
"paulmck@...nel.org" <paulmck@...nel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"kvm@...r.kernel.org" <kvm@...r.kernel.org>,
"rcu@...r.kernel.org" <rcu@...r.kernel.org>,
"mimoja@...oja.de" <mimoja@...oja.de>,
"hewenliang4@...wei.com" <hewenliang4@...wei.com>,
"seanjc@...gle.com" <seanjc@...gle.com>,
"pmenzel@...gen.mpg.de" <pmenzel@...gen.mpg.de>,
"fam.zheng@...edance.com" <fam.zheng@...edance.com>,
"punit.agrawal@...edance.com" <punit.agrawal@...edance.com>,
"simon.evans@...edance.com" <simon.evans@...edance.com>,
"liangma@...ngbit.com" <liangma@...ngbit.com>
Subject: Re: [PATCH v13 00/11] Parallel CPU bringup for x86_64
On Wed, 2023-03-08 at 12:15 +0000, David Laight wrote:
>
> > /*
> > * Encrypted guests other than SEV-ES (in the future) will need to
> > * implement an early way of finding the APIC ID, since they will
> > * presumably block direct CPUID too. Be kind to our future selves
> > * by warning here instead of just letting them break. Parallel
> > * startup doesn't have to be in the first round of enabling patches
> > * for any such technology.
> > */
> > if (cc_platform_has(CC_ATTR_GUEST_STATE_ENCRYPT) || !has_sev_es) {
> > pr_info("Disabling parallel bringup due to guest memory encryption\n");
> > return false;
> > }
>
> That looks wrong, won't has_sev_es almost always be false
> so it prints the message and returns?
> Maybe s/||/&&/ ?
D'oh! Fixed; thanks.
Download attachment "smime.p7s" of type "application/pkcs7-signature" (5965 bytes)
Powered by blists - more mailing lists