Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp1998765ybi; Thu, 18 Jul 2019 01:46:16 -0700 (PDT) X-Google-Smtp-Source: APXvYqx+UfGRP0jntPlW4bvIM/1oxTcgY2sLsRhPc6T5xfloQw7dSoKTABAawSwO+mC9iGwqI+ww X-Received: by 2002:a17:90a:24ac:: with SMTP id i41mr49180465pje.124.1563439576452; Thu, 18 Jul 2019 01:46:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563439576; cv=none; d=google.com; s=arc-20160816; b=E0oPiUSccBvM3SYQ51tKbddI93MmJ2geJldBBNyT3pXh1AEmdn3Mz50xrFXUfrJ4dw 4ePV6TzzcBVZAonCRbn10oVmSNtgct+QJ8Ujy68ZcBHXBXyyLv0THW2lnqhjvIArCPyK ZmD2VET+rZ2fAwn1XUrVLA7fK5sna4KN7BoBU205MFehpNdin8lyyUjDcntbqrg3CJpM TU4clguyiWtSCRAiijM2qqliAF3Ygw85BkF3HoaoQAoKHfl6h3xtCaBcfxThjcy24D1W FV0Wt7DRD4qDuDcT/SOLRSusQpgQYGtrdmi5grON2Flo4C/X4U8KP3rPMV2bE80j4Np0 3p2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=USF9Xqn54zYtEgwYHImud7x60elzbu+XS66+BXBVVUE=; b=DscQEV0kkghXbIs+dnVx1hJtzZrcFaj1O2T/l8fd/YQQngNFqx+ylC5TvQvelFH2TO 9ZOL4JV0LQHnmqHIDOWnJNgQPn5DEQKTF5lh/kDQEGyzWuQMk/2EItYhZooNuPbV8DbH ArODBoCh6l/qjVALR415HoaU/sQ6pV7qH5Z93LTUik6ftJEKn2XS/6EuIoT8XzS+95Lk y2Pr51bz++oGpsnD+apkFKr4c9HzT68ZB+T6IBeQjnyvUI44NUMlGpgnB6v9CRMA8jDc PRofk7ayzcLIMt/Dpqt05b96/tNyAl0tgkmrSCKYqMEkjGHfRdgzsqNTxUs2NFM5STiW BYtQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z5si1419817pjp.101.2019.07.18.01.46.00; Thu, 18 Jul 2019 01:46:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389515AbfGRIoS (ORCPT + 99 others); Thu, 18 Jul 2019 04:44:18 -0400 Received: from verein.lst.de ([213.95.11.211]:57873 "EHLO verein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726649AbfGRIoS (ORCPT ); Thu, 18 Jul 2019 04:44:18 -0400 Received: by verein.lst.de (Postfix, from userid 2407) id D492968B05; Thu, 18 Jul 2019 10:44:16 +0200 (CEST) Date: Thu, 18 Jul 2019 10:44:16 +0200 From: Christoph Hellwig To: Thiago Jung Bauermann Cc: x86@kernel.org, iommu@lists.linux-foundation.org, linux-fsdevel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Christoph Hellwig , Marek Szyprowski , Robin Murphy , Konrad Rzeszutek Wilk , Alexey Dobriyan , Thomas Lendacky , Halil Pasic , Mike Anderson , Ram Pai Subject: Re: [PATCH v3 5/6] fs/core/vmcore: Move sev_active() reference to x86 arch code Message-ID: <20190718084416.GD24562@lst.de> References: <20190718032858.28744-1-bauerman@linux.ibm.com> <20190718032858.28744-6-bauerman@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190718032858.28744-6-bauerman@linux.ibm.com> User-Agent: Mutt/1.5.17 (2007-11-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jul 18, 2019 at 12:28:57AM -0300, Thiago Jung Bauermann wrote: > Secure Encrypted Virtualization is an x86-specific feature, so it shouldn't > appear in generic kernel code because it forces non-x86 architectures to > define the sev_active() function, which doesn't make a lot of sense. > > To solve this problem, add an x86 elfcorehdr_read() function to override > the generic weak implementation. To do that, it's necessary to make > read_from_oldmem() public so that it can be used outside of vmcore.c. > > Also, remove the export for sev_active() since it's only used in files that > won't be built as modules. I have to say I find the __weak overrides of the vmcore files very confusing and which we'd have a better scheme there. But as this fits into that scheme and allows to remove the AMD SME vs SEV knowledge from the core I'm fine with it. Reviewed-by: Christoph Hellwig