mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-22 12:14:01 +08:00
ae7eb82a92
Secure Encrypted Virtualization is an x86-specific feature, so it shouldn't appear in generic kernel code because it forces non-x86 architectures to define the sev_active() function, which doesn't make a lot of sense. To solve this problem, add an x86 elfcorehdr_read() function to override the generic weak implementation. To do that, it's necessary to make read_from_oldmem() public so that it can be used outside of vmcore.c. Also, remove the export for sev_active() since it's only used in files that won't be built as modules. Signed-off-by: Thiago Jung Bauermann <bauerman@linux.ibm.com> Reviewed-by: Christoph Hellwig <hch@lst.de> Reviewed-by: Lianbo Jiang <lijiang@redhat.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> Link: https://lore.kernel.org/r/20190806044919.10622-6-bauerman@linux.ibm.com
41 lines
885 B
C
41 lines
885 B
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* AMD Memory Encryption Support
|
|
*
|
|
* Copyright (C) 2016 Advanced Micro Devices, Inc.
|
|
*
|
|
* Author: Tom Lendacky <thomas.lendacky@amd.com>
|
|
*/
|
|
|
|
#ifndef __MEM_ENCRYPT_H__
|
|
#define __MEM_ENCRYPT_H__
|
|
|
|
#ifndef __ASSEMBLY__
|
|
|
|
#ifdef CONFIG_ARCH_HAS_MEM_ENCRYPT
|
|
|
|
#include <asm/mem_encrypt.h>
|
|
|
|
#else /* !CONFIG_ARCH_HAS_MEM_ENCRYPT */
|
|
|
|
static inline bool mem_encrypt_active(void) { return false; }
|
|
|
|
#endif /* CONFIG_ARCH_HAS_MEM_ENCRYPT */
|
|
|
|
#ifdef CONFIG_AMD_MEM_ENCRYPT
|
|
/*
|
|
* The __sme_set() and __sme_clr() macros are useful for adding or removing
|
|
* the encryption mask from a value (e.g. when dealing with pagetable
|
|
* entries).
|
|
*/
|
|
#define __sme_set(x) ((x) | sme_me_mask)
|
|
#define __sme_clr(x) ((x) & ~sme_me_mask)
|
|
#else
|
|
#define __sme_set(x) (x)
|
|
#define __sme_clr(x) (x)
|
|
#endif
|
|
|
|
#endif /* __ASSEMBLY__ */
|
|
|
|
#endif /* __MEM_ENCRYPT_H__ */
|