diff options
author | Thiago Jung Bauermann <bauerman@linux.ibm.com> | 2019-08-06 01:49:17 -0300 |
---|---|---|
committer | Michael Ellerman <mpe@ellerman.id.au> | 2019-08-09 22:52:08 +1000 |
commit | 284e21fab2cfcf90dacce565e0b12f29e5df00c1 (patch) | |
tree | f3ff0d324d2c19857a4e842a1c7369e0421e1fc2 /arch/x86/mm/mem_encrypt.c | |
parent | e740815a97e2b6d6446792f4328378e66de166d1 (diff) | |
download | linux-284e21fab2cfcf90dacce565e0b12f29e5df00c1.tar.gz linux-284e21fab2cfcf90dacce565e0b12f29e5df00c1.tar.bz2 linux-284e21fab2cfcf90dacce565e0b12f29e5df00c1.zip |
x86, s390/mm: Move sme_active() and sme_me_mask to x86-specific header
Now that generic code doesn't reference them, move sme_active() and
sme_me_mask to x86's <asm/mem_encrypt.h>.
Also remove the export for sme_active() since it's only used in files that
won't be built as modules. sme_me_mask on the other hand is used in
arch/x86/kvm/svm.c (via __sme_set() and __psp_pa()) which can be built as a
module so its export needs to stay.
Signed-off-by: Thiago Jung Bauermann <bauerman@linux.ibm.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20190806044919.10622-5-bauerman@linux.ibm.com
Diffstat (limited to 'arch/x86/mm/mem_encrypt.c')
-rw-r--r-- | arch/x86/mm/mem_encrypt.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/arch/x86/mm/mem_encrypt.c b/arch/x86/mm/mem_encrypt.c index fece30ca8b0c..94da5a88abe6 100644 --- a/arch/x86/mm/mem_encrypt.c +++ b/arch/x86/mm/mem_encrypt.c @@ -344,7 +344,6 @@ bool sme_active(void) { return sme_me_mask && !sev_enabled; } -EXPORT_SYMBOL(sme_active); bool sev_active(void) { |