]> asedeno.scripts.mit.edu Git - linux.git/commitdiff
s390/mm: Remove sev_active() function
authorThiago Jung Bauermann <bauerman@linux.ibm.com>
Tue, 6 Aug 2019 04:49:19 +0000 (01:49 -0300)
committerMichael Ellerman <mpe@ellerman.id.au>
Fri, 9 Aug 2019 12:52:11 +0000 (22:52 +1000)
All references to sev_active() were moved to arch/x86 so we don't need to
define it for s390 anymore.

Signed-off-by: Thiago Jung Bauermann <bauerman@linux.ibm.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Halil Pasic <pasic@linux.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20190806044919.10622-7-bauerman@linux.ibm.com
arch/s390/include/asm/mem_encrypt.h
arch/s390/mm/init.c

index ff813a56bc300714e56674243f2a701236e0f196..2542cbf7e2d1805d5256788aaa9e1b78dbd48660 100644 (file)
@@ -5,7 +5,6 @@
 #ifndef __ASSEMBLY__
 
 static inline bool mem_encrypt_active(void) { return false; }
-extern bool sev_active(void);
 
 int set_memory_encrypted(unsigned long addr, int numpages);
 int set_memory_decrypted(unsigned long addr, int numpages);
index 20340a03ad90c5d7c21d4dbb1588db30abc1c129..a124f19f7b3cc48879d2fc2111be1b27c7b1761b 100644 (file)
@@ -156,14 +156,9 @@ int set_memory_decrypted(unsigned long addr, int numpages)
 }
 
 /* are we a protected virtualization guest? */
-bool sev_active(void)
-{
-       return is_prot_virt_guest();
-}
-
 bool force_dma_unencrypted(struct device *dev)
 {
-       return sev_active();
+       return is_prot_virt_guest();
 }
 
 /* protected virtualization */