@@ -592,14 +592,14 @@ static inline void kvm_cpu_svm_disable(void)
592592 }
593593}
594594
595- static void svm_emergency_disable (void )
595+ static void svm_emergency_disable_virtualization_cpu (void )
596596{
597597 kvm_rebooting = true;
598598
599599 kvm_cpu_svm_disable ();
600600}
601601
602- static void svm_hardware_disable (void )
602+ static void svm_disable_virtualization_cpu (void )
603603{
604604 /* Make sure we clean up behind us */
605605 if (tsc_scaling )
@@ -610,7 +610,7 @@ static void svm_hardware_disable(void)
610610 amd_pmu_disable_virt ();
611611}
612612
613- static int svm_hardware_enable (void )
613+ static int svm_enable_virtualization_cpu (void )
614614{
615615
616616 struct svm_cpu_data * sd ;
@@ -1533,7 +1533,7 @@ static void svm_prepare_switch_to_guest(struct kvm_vcpu *vcpu)
15331533 * TSC_AUX is always virtualized for SEV-ES guests when the feature is
15341534 * available. The user return MSR support is not required in this case
15351535 * because TSC_AUX is restored on #VMEXIT from the host save area
1536- * (which has been initialized in svm_hardware_enable ()).
1536+ * (which has been initialized in svm_enable_virtualization_cpu ()).
15371537 */
15381538 if (likely (tsc_aux_uret_slot >= 0 ) &&
15391539 (!boot_cpu_has (X86_FEATURE_V_TSC_AUX ) || !sev_es_guest (vcpu -> kvm )))
@@ -3132,7 +3132,7 @@ static int svm_set_msr(struct kvm_vcpu *vcpu, struct msr_data *msr)
31323132 * feature is available. The user return MSR support is not
31333133 * required in this case because TSC_AUX is restored on #VMEXIT
31343134 * from the host save area (which has been initialized in
3135- * svm_hardware_enable ()).
3135+ * svm_enable_virtualization_cpu ()).
31363136 */
31373137 if (boot_cpu_has (X86_FEATURE_V_TSC_AUX ) && sev_es_guest (vcpu -> kvm ))
31383138 break ;
@@ -4980,8 +4980,8 @@ static struct kvm_x86_ops svm_x86_ops __initdata = {
49804980 .check_processor_compatibility = svm_check_processor_compat ,
49814981
49824982 .hardware_unsetup = svm_hardware_unsetup ,
4983- .hardware_enable = svm_hardware_enable ,
4984- .hardware_disable = svm_hardware_disable ,
4983+ .enable_virtualization_cpu = svm_enable_virtualization_cpu ,
4984+ .disable_virtualization_cpu = svm_disable_virtualization_cpu ,
49854985 .has_emulated_msr = svm_has_emulated_msr ,
49864986
49874987 .vcpu_create = svm_vcpu_create ,
@@ -5411,7 +5411,7 @@ static void __svm_exit(void)
54115411{
54125412 kvm_x86_vendor_exit ();
54135413
5414- cpu_emergency_unregister_virt_callback (svm_emergency_disable );
5414+ cpu_emergency_unregister_virt_callback (svm_emergency_disable_virtualization_cpu );
54155415}
54165416
54175417static int __init svm_init (void )
@@ -5427,7 +5427,7 @@ static int __init svm_init(void)
54275427 if (r )
54285428 return r ;
54295429
5430- cpu_emergency_register_virt_callback (svm_emergency_disable );
5430+ cpu_emergency_register_virt_callback (svm_emergency_disable_virtualization_cpu );
54315431
54325432 /*
54335433 * Common KVM initialization _must_ come last, after this, /dev/kvm is
0 commit comments