From nobody Sat Feb 7 21:08:21 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 15A9E359FBB for ; Mon, 19 Jan 2026 14:13:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768831995; cv=none; b=pn9Uuk0UWgnTmgOP4xflJFIw9pdzeF3glKq96fTX/u3NOMFolwPotcVI/4mgq3EFvrovUybTSiLdi9R0V9ezqViDfKMrUl2KLGeSYsseQf8RCn+Ift0mtK4OESSdKf491WrIcuwv7umBtYitX5xcDRquJyoKzmfxO5jaQbrjg8M= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768831995; c=relaxed/simple; bh=BGLFjgn1nyo3kW3DeMW23d9Rcrurzj+EcBe0cdjeUZ0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=apzvPMTA6C7Um9uJRGoQnjm6nn8aRPXqZX6E7l3uanjbnaBqaOiOxgOwISVmX2mitQae9yLt/H0QPUds0c36fsW2B3uazG71TvXgsV82kuQA0hi3DXGMl3vENZQJWjNot9z3AyDFELBzln4frc6IVnBuhVKWqIJgVeF2BcM4dQw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=nwlToagN; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="nwlToagN" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 80B98C116C6; Mon, 19 Jan 2026 14:13:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1768831994; bh=BGLFjgn1nyo3kW3DeMW23d9Rcrurzj+EcBe0cdjeUZ0=; h=From:To:Cc:Subject:Date:From; b=nwlToagNiM5w7FEOUyi4CBU89P12xdi2G8+ZmHWQaqFzYWo2SIsEQh9oSNvB7v3Kl rV0mvM3bQyp9k939gCrydyKJC6yeAzY6drfevXhGTm2oM5c104h7InjF5cyl5f3i72 HPNLVcLPWD7vdVISDB9GqFZe0s3BfWzEmUMb7/Nf58LB6xluRx4zIeoXmZBN3E0HXY fb1mte6ovVcGABH+qUGr7B/KoR5BDIFBDaF8idmIz8sWX7PkVo8JFdsDkAaa6w8N/G vewi15O3tTILegwM46ARewXjl8iccBG7kB7uGUqmdpTEyB3F8UQP8B9Omh0cKp6iEE 3bD7cPr+ZgOWg== From: Borislav Petkov To: Tom Lendacky Cc: X86 ML , LKML , "Borislav Petkov (AMD)" Subject: [PATCH] x86/sev: Rename sev_es_ghcb_handle_msr() to __vc_handle_msr() Date: Mon, 19 Jan 2026 15:13:10 +0100 Message-ID: <20260119141310.29605-1-bp@kernel.org> X-Mailer: git-send-email 2.51.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: "Borislav Petkov (AMD)" Forgot to do that during the Secure AVIC review. :-\ No functional changes. Signed-off-by: Borislav Petkov (AMD) Reviewed-by: Tom Lendacky --- arch/x86/coco/sev/core.c | 4 ++-- arch/x86/coco/sev/internal.h | 2 +- arch/x86/coco/sev/vc-handle.c | 4 ++-- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/arch/x86/coco/sev/core.c b/arch/x86/coco/sev/core.c index 379e0c09c7f3..a059e004f61b 100644 --- a/arch/x86/coco/sev/core.c +++ b/arch/x86/coco/sev/core.c @@ -989,7 +989,7 @@ u64 savic_ghcb_msr_read(u32 reg) ghcb =3D __sev_get_ghcb(&state); vc_ghcb_invalidate(ghcb); =20 - res =3D sev_es_ghcb_handle_msr(ghcb, &ctxt, false); + res =3D __vc_handle_msr(ghcb, &ctxt, false); if (res !=3D ES_OK) { pr_err("Secure AVIC MSR (0x%llx) read returned error (%d)\n", msr, res); /* MSR read failures are treated as fatal errors */ @@ -1019,7 +1019,7 @@ void savic_ghcb_msr_write(u32 reg, u64 value) ghcb =3D __sev_get_ghcb(&state); vc_ghcb_invalidate(ghcb); =20 - res =3D sev_es_ghcb_handle_msr(ghcb, &ctxt, true); + res =3D __vc_handle_msr(ghcb, &ctxt, true); if (res !=3D ES_OK) { pr_err("Secure AVIC MSR (0x%llx) write returned error (%d)\n", msr, res); /* MSR writes should never fail. Any failure is fatal error for SNP gues= t */ diff --git a/arch/x86/coco/sev/internal.h b/arch/x86/coco/sev/internal.h index 039326b5c799..b1d0c66a651a 100644 --- a/arch/x86/coco/sev/internal.h +++ b/arch/x86/coco/sev/internal.h @@ -85,7 +85,7 @@ static __always_inline void sev_es_wr_ghcb_msr(u64 val) native_wrmsr(MSR_AMD64_SEV_ES_GHCB, low, high); } =20 -enum es_result sev_es_ghcb_handle_msr(struct ghcb *ghcb, struct es_em_ctxt= *ctxt, bool write); +enum es_result __vc_handle_msr(struct ghcb *ghcb, struct es_em_ctxt *ctxt,= bool write); =20 u64 get_hv_features(void); =20 diff --git a/arch/x86/coco/sev/vc-handle.c b/arch/x86/coco/sev/vc-handle.c index 43f264afd590..d98b5c08ef00 100644 --- a/arch/x86/coco/sev/vc-handle.c +++ b/arch/x86/coco/sev/vc-handle.c @@ -404,7 +404,7 @@ static enum es_result __vc_handle_secure_tsc_msrs(struc= t es_em_ctxt *ctxt, bool return ES_OK; } =20 -enum es_result sev_es_ghcb_handle_msr(struct ghcb *ghcb, struct es_em_ctxt= *ctxt, bool write) +enum es_result __vc_handle_msr(struct ghcb *ghcb, struct es_em_ctxt *ctxt,= bool write) { struct pt_regs *regs =3D ctxt->regs; enum es_result ret; @@ -448,7 +448,7 @@ enum es_result sev_es_ghcb_handle_msr(struct ghcb *ghcb= , struct es_em_ctxt *ctxt =20 static enum es_result vc_handle_msr(struct ghcb *ghcb, struct es_em_ctxt *= ctxt) { - return sev_es_ghcb_handle_msr(ghcb, ctxt, ctxt->insn.opcode.bytes[1] =3D= =3D 0x30); + return __vc_handle_msr(ghcb, ctxt, ctxt->insn.opcode.bytes[1] =3D=3D 0x30= ); } =20 static void __init vc_early_forward_exception(struct es_em_ctxt *ctxt) --=20 2.51.0