mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2026-04-03 12:05:13 +02:00
Implementing the internal mem_encrypt API for arm64 depends entirely on the Confidential Computing environment in which the kernel is running. Introduce a simple dispatcher so that backend hooks can be registered depending upon the environment in which the kernel finds itself. Reviewed-by: Catalin Marinas <catalin.marinas@arm.com> Reviewed-by: Steven Price <steven.price@arm.com> Acked-by: Marc Zyngier <maz@kernel.org> Link: https://lore.kernel.org/r/20240830130150.8568-4-will@kernel.org Signed-off-by: Will Deacon <will@kernel.org>
19 lines
516 B
C
19 lines
516 B
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
|
|
#ifndef _ASM_ARM64_SET_MEMORY_H
|
|
#define _ASM_ARM64_SET_MEMORY_H
|
|
|
|
#include <asm/mem_encrypt.h>
|
|
#include <asm-generic/set_memory.h>
|
|
|
|
bool can_set_direct_map(void);
|
|
#define can_set_direct_map can_set_direct_map
|
|
|
|
int set_memory_valid(unsigned long addr, int numpages, int enable);
|
|
|
|
int set_direct_map_invalid_noflush(struct page *page);
|
|
int set_direct_map_default_noflush(struct page *page);
|
|
bool kernel_page_present(struct page *page);
|
|
|
|
#endif /* _ASM_ARM64_SET_MEMORY_H */
|