x86/sev: Rename mem_encrypt.c to mem_encrypt_amd.c
authorKuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@linux.intel.com>
Mon, 6 Dec 2021 13:55:04 +0000 (16:55 +0300)
committerBorislav Petkov <bp@suse.de>
Wed, 8 Dec 2021 15:49:47 +0000 (16:49 +0100)
Both Intel TDX and AMD SEV implement memory encryption features. But the
bulk of the code in mem_encrypt.c is AMD-specific. Rename the file to
mem_encrypt_amd.c. A subsequent patch will extract the parts that can be
shared by both TDX and AMD SEV/SME into a generic file.

No functional changes.

Signed-off-by: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@linux.intel.com>
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Reviewed-by: Tony Luck <tony.luck@intel.com>
Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
Tested-by: Tom Lendacky <thomas.lendacky@amd.com>
Link: https://lore.kernel.org/r/20211206135505.75045-3-kirill.shutemov@linux.intel.com
arch/x86/mm/Makefile
arch/x86/mm/mem_encrypt_amd.c [moved from arch/x86/mm/mem_encrypt.c with 100% similarity]

index 5864219..c9c4806 100644 (file)
@@ -1,10 +1,10 @@
 # SPDX-License-Identifier: GPL-2.0
 # Kernel does not boot with instrumentation of tlb.c and mem_encrypt*.c
 KCOV_INSTRUMENT_tlb.o                  := n
-KCOV_INSTRUMENT_mem_encrypt.o          := n
+KCOV_INSTRUMENT_mem_encrypt_amd.o      := n
 KCOV_INSTRUMENT_mem_encrypt_identity.o := n
 
-KASAN_SANITIZE_mem_encrypt.o           := n
+KASAN_SANITIZE_mem_encrypt_amd.o       := n
 KASAN_SANITIZE_mem_encrypt_identity.o  := n
 
 # Disable KCSAN entirely, because otherwise we get warnings that some functions
@@ -12,7 +12,7 @@ KASAN_SANITIZE_mem_encrypt_identity.o := n
 KCSAN_SANITIZE := n
 
 ifdef CONFIG_FUNCTION_TRACER
-CFLAGS_REMOVE_mem_encrypt.o            = -pg
+CFLAGS_REMOVE_mem_encrypt_amd.o                = -pg
 CFLAGS_REMOVE_mem_encrypt_identity.o   = -pg
 endif
 
@@ -52,6 +52,6 @@ obj-$(CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS)        += pkeys.o
 obj-$(CONFIG_RANDOMIZE_MEMORY)                 += kaslr.o
 obj-$(CONFIG_PAGE_TABLE_ISOLATION)             += pti.o
 
-obj-$(CONFIG_AMD_MEM_ENCRYPT)  += mem_encrypt.o
+obj-$(CONFIG_AMD_MEM_ENCRYPT)  += mem_encrypt_amd.o
 obj-$(CONFIG_AMD_MEM_ENCRYPT)  += mem_encrypt_identity.o
 obj-$(CONFIG_AMD_MEM_ENCRYPT)  += mem_encrypt_boot.o