mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git
synced 2026-04-18 03:23:53 -04:00
treewide: Replace the use of mem_encrypt_active() with cc_platform_has()
Replace uses of mem_encrypt_active() with calls to cc_platform_has() with the CC_ATTR_MEM_ENCRYPT attribute. Remove the implementation of mem_encrypt_active() across all arches. For s390, since the default implementation of the cc_platform_has() matches the s390 implementation of mem_encrypt_active(), cc_platform_has() does not need to be implemented in s390 (the config option ARCH_HAS_CC_PLATFORM is not set). Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com> Signed-off-by: Borislav Petkov <bp@suse.de> Link: https://lkml.kernel.org/r/20210928191009.32551-9-bp@alien8.de
This commit is contained in:
committed by
Borislav Petkov
parent
6283f2effb
commit
e9d1d2bb75
@@ -28,7 +28,7 @@
|
||||
#include <linux/kernel.h>
|
||||
#include <linux/module.h>
|
||||
#include <linux/slab.h>
|
||||
#include <linux/mem_encrypt.h>
|
||||
#include <linux/cc_platform.h>
|
||||
|
||||
#include <asm/hypervisor.h>
|
||||
#include <drm/drm_ioctl.h>
|
||||
@@ -160,7 +160,7 @@ static unsigned long vmw_port_hb_out(struct rpc_channel *channel,
|
||||
unsigned long msg_len = strlen(msg);
|
||||
|
||||
/* HB port can't access encrypted memory. */
|
||||
if (hb && !mem_encrypt_active()) {
|
||||
if (hb && !cc_platform_has(CC_ATTR_MEM_ENCRYPT)) {
|
||||
unsigned long bp = channel->cookie_high;
|
||||
u32 channel_id = (channel->channel_id << 16);
|
||||
|
||||
@@ -216,7 +216,7 @@ static unsigned long vmw_port_hb_in(struct rpc_channel *channel, char *reply,
|
||||
unsigned long si, di, eax, ebx, ecx, edx;
|
||||
|
||||
/* HB port can't access encrypted memory */
|
||||
if (hb && !mem_encrypt_active()) {
|
||||
if (hb && !cc_platform_has(CC_ATTR_MEM_ENCRYPT)) {
|
||||
unsigned long bp = channel->cookie_low;
|
||||
u32 channel_id = (channel->channel_id << 16);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user