diff mbox series

[v2,2/4] s390/mm: Export force_dma_unencrypted

Message ID 20190903131504.18935-3-thomas_os@shipmail.org (mailing list archive)
State New, archived
Headers show
Series Have TTM support SEV encryption with coherent memory | expand

Commit Message

Thomas Hellström (Intel) Sept. 3, 2019, 1:15 p.m. UTC
From: Thomas Hellstrom <thellstrom@vmware.com>

The force_dma_unencrypted symbol is needed by TTM to set up the correct
page protection when memory encryption is active. Export it.

Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Heiko Carstens <heiko.carstens@de.ibm.com>
Cc: Christian Borntraeger <borntraeger@de.ibm.com>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Cc: Christian König <christian.koenig@amd.com>
Signed-off-by: Thomas Hellstrom <thellstrom@vmware.com>
---
 arch/s390/mm/init.c | 1 +
 1 file changed, 1 insertion(+)
diff mbox series

Patch

diff --git a/arch/s390/mm/init.c b/arch/s390/mm/init.c
index 20340a03ad90..eec7cc303a31 100644
--- a/arch/s390/mm/init.c
+++ b/arch/s390/mm/init.c
@@ -165,6 +165,7 @@  bool force_dma_unencrypted(struct device *dev)
 {
 	return sev_active();
 }
+EXPORT_SYMBOL(force_dma_unencrypted);
 
 /* protected virtualization */
 static void pv_init(void)