]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
x86/sev: Guard sev_evict_cache() with CONFIG_AMD_MEM_ENCRYPT
authorTom Lendacky <thomas.lendacky@amd.com>
Mon, 15 Sep 2025 16:04:12 +0000 (11:04 -0500)
committerBorislav Petkov (AMD) <bp@alien8.de>
Mon, 15 Sep 2025 16:29:43 +0000 (18:29 +0200)
commit7f830e126dc357fc086905ce9730140fd4528d66
tree0a9c8c3b1797eb2e243c19f0863e69092ee245d0
parentf83ec76bf285bea5727f478a68b894f5543ca76e
x86/sev: Guard sev_evict_cache() with CONFIG_AMD_MEM_ENCRYPT

The sev_evict_cache() is guest-related code and should be guarded by
CONFIG_AMD_MEM_ENCRYPT, not CONFIG_KVM_AMD_SEV.

CONFIG_AMD_MEM_ENCRYPT=y is required for a guest to run properly as an SEV-SNP
guest, but a guest kernel built with CONFIG_KVM_AMD_SEV=n would get the stub
function of sev_evict_cache() instead of the version that performs the actual
eviction. Move the function declarations under the appropriate #ifdef.

Fixes: 7b306dfa326f ("x86/sev: Evict cache lines during SNP memory validation")
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Cc: stable@kernel.org # 6.16.x
Link: https://lore.kernel.org/r/70e38f2c4a549063de54052c9f64929705313526.1757708959.git.thomas.lendacky@amd.com
arch/x86/include/asm/sev.h