x86/sev: Move sev_setup_arch() to mem_encrypt.c
authorAlexander Shishkin <alexander.shishkin@linux.intel.com>
Tue, 10 Oct 2023 14:52:19 +0000 (17:52 +0300)
committerIngo Molnar <mingo@kernel.org>
Wed, 11 Oct 2023 08:15:47 +0000 (10:15 +0200)
commit6e74b125155dc8c747d76fb45d8e6d20e9e4fb4d
tree1c06f55d492e7cebcb31bd499e6724cdeb045e25
parentc9babd5d95abf3fae6e798605ce5cac98e08daf9
x86/sev: Move sev_setup_arch() to mem_encrypt.c

Since commit:

  4d96f9109109b ("x86/sev: Replace occurrences of sev_active() with cc_platform_has()")

... the SWIOTLB bounce buffer size adjustment and restricted virtio memory
setting also inadvertently apply to TDX: the code is using
cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT) as a gatekeeping condition,
which is also true for TDX, and this is also what we want.

To reflect this, move the corresponding code to generic mem_encrypt.c.

No functional changes intended.

Signed-off-by: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
Link: https://lore.kernel.org/r/20231010145220.3960055-2-alexander.shishkin@linux.intel.com
arch/x86/include/asm/mem_encrypt.h
arch/x86/kernel/setup.c
arch/x86/mm/mem_encrypt.c
arch/x86/mm/mem_encrypt_amd.c