From nobody Sun May 24 20:34:46 2026 Received: from mail-pj1-f73.google.com (mail-pj1-f73.google.com [209.85.216.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5C5281E5207 for ; Fri, 22 May 2026 22:59:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.73 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779490751; cv=none; b=hOaZ8yF3juCTv1xvrN/u3xuCwtafVNzQyGPUZfvA8ev7LYezkJCDdhDFSnhuo6sR9XV4/EEjjmcZORg3NdAGFirSR+5dmktbJW9rJFecp/2SicMN4PvDkZjHj6XCr1G6Dt0HwOuZxXlybr/eLamZtL3AjAYapFEB8M60QVvVYGU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779490751; c=relaxed/simple; bh=rWTsshiJKhwNQtbIBpxggYt18dRPogRXyiEsHJVwlb0=; h=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type; b=B382w+TzqT2JK0RR0DdKrGu3ZgxQHoW9AobOCrCxsvpiUzZIotGrObTlp+q53I3A1fXj6PxMQ1I16RUn1GdMmHfIbCJ9i93lejtrrkrHNJ4o2EXck/4fIrF9MJfcsP8Q/d2RwbD8ZkEw9PkngsTZ81AzLH5WHMQjfoL8PT/mocY= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--tjmercier.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=OSd6p64M; arc=none smtp.client-ip=209.85.216.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--tjmercier.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="OSd6p64M" Received: by mail-pj1-f73.google.com with SMTP id 98e67ed59e1d1-36603ad6709so6490229a91.2 for ; Fri, 22 May 2026 15:59:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1779490749; x=1780095549; darn=vger.kernel.org; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=YdUzE6tqdZkacDbc+Ei+hTDSqETPzI5AVuuqPmJdYCI=; b=OSd6p64MjcFpehuCFrJCCHZo5utBhmRGqssFVdzUZHNDU5umfdTm2f6aQ1C2KRLQcE QY1AMm/1xzfZsGs91B7Da1VCZ1x3NCPog3OfaHeRzw5pw1cUcc5sk8kZLcevCo3asC7x VhCWxzytDoOsdHd0DdaqatHUgBjHhCGNmElv2ZnUDfRqPQnJVMJhJDjtnlgPnBiybolf 8Y7QyrDUz9ETL75KdeprWUyxCcIAwhXcMCafitQnTQ5K/mE8Nx78RKy8Ak92ZmEmG946 NMToLheIVoV+Glayu/iL1RjxXsbo2ARYRkpIbByOyVjlw+6YwqveMoRkLen/xL9rjz3g BPmQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779490749; x=1780095549; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=YdUzE6tqdZkacDbc+Ei+hTDSqETPzI5AVuuqPmJdYCI=; b=pqNzbNe4Kd/Wvlxff7Fo4jW0GTZE7+CEAY6BPO1cNcHmlNeCFJQaW8s7PQzH3qzpXA Mc1czgWLelILuc7ncBrUWTFeaK8RnG/3GvKCHK6VPPX2ujE02KeRcnpxKGIcTBIBYVmA 1YdtfC4CY1et1p6qiXoI1xS2QwG/AyGtuJFNkhKmQV39IuO2+pBbXL1UBSI3A5GECgIj fd4SWiLulN0QZ7b0gLKoxty7dXaKvq69NkNW/rMfh9JfwXIQ6uIm4dQaE09qcx8BUvqw wyd0QCz9Qe1CCnp/L0TlpWZvS6ag7yQFXdu+B+2oXBogXjzGAXp8ElrFn5/YWgqLZizh djLw== X-Forwarded-Encrypted: i=1; AFNElJ9hOuIgNPTfXK7JymM7CqafcgEBdv/WP9UQjEBlyqCJ56VjxzP3krtBvU/jGx/ub5FflnCXAVTIkhscMS0=@vger.kernel.org X-Gm-Message-State: AOJu0YzJLF2Hn2ZzL2mk0EWZf/1iNunryntqvTXHXYCR2/X04ejXiXZ4 i6QDhXxcapx4M1l1j586D8+5ppKfj/HkCX69VhnD0fi+OATB1cUZPfA7zU8w8nQw7JgB60PeaDG OvP/6djHmLRHY1AdF2w== X-Received: from pjbcu23.prod.google.com ([2002:a17:90a:fa97:b0:369:8552:9db3]) (user=tjmercier job=prod-delivery.src-stubby-dispatcher) by 2002:a17:90b:3511:b0:369:e1fa:962b with SMTP id 98e67ed59e1d1-36a67896c7emr5260153a91.26.1779490749237; Fri, 22 May 2026 15:59:09 -0700 (PDT) Date: Fri, 22 May 2026 15:58:53 -0700 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 X-Mailer: git-send-email 2.54.0.746.g67dd491aae-goog Message-ID: <20260522225853.878411-1-tjmercier@google.com> Subject: [PATCH] powerpc: Export set_memory_encrypted and set_memory_decrypted From: "T.J. Mercier" To: maddy@linux.ibm.com, mpe@ellerman.id.au, npiggin@gmail.com, chleroy@kernel.org, linuxppc-dev@lists.ozlabs.org, mripard@kernel.org, sumit.semwal@linaro.org Cc: lkp@intel.com, linux-kernel@vger.kernel.org, "T.J. Mercier" Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" After commit fd55edff8a0a ("dma-buf: heaps: system: Turn the heap into a module") the system dma-buf heaps can be built as a module. The system_cc_shared heap uses set_memory_encrypted and set_memory_decrypted but those functions are not exported on powerpc. This can result in a build error like: >> ERROR: modpost: "set_memory_decrypted" [drivers/dma-buf/heaps/system_hea= p.ko] undefined! >> ERROR: modpost: "set_memory_encrypted" [drivers/dma-buf/heaps/system_hea= p.ko] undefined! Export the functions so system_heap.ko can be built. Reported-by: kernel test robot Closes: https://lore.kernel.org/oe-kbuild-all/202605230046.E9uhmQXM-lkp@int= el.com/ Fixes: fd55edff8a0a ("dma-buf: heaps: system: Turn the heap into a module") Signed-off-by: T.J. Mercier --- arch/powerpc/platforms/pseries/svm.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/powerpc/platforms/pseries/svm.c b/arch/powerpc/platforms/= pseries/svm.c index 384c9dc1899a..59cf32e51ca3 100644 --- a/arch/powerpc/platforms/pseries/svm.c +++ b/arch/powerpc/platforms/pseries/svm.c @@ -50,6 +50,7 @@ int set_memory_encrypted(unsigned long addr, int numpages) =20 return 0; } +EXPORT_SYMBOL_GPL(set_memory_encrypted); =20 int set_memory_decrypted(unsigned long addr, int numpages) { @@ -63,6 +64,8 @@ int set_memory_decrypted(unsigned long addr, int numpages) =20 return 0; } +EXPORT_SYMBOL_GPL(set_memory_decrypted); + =20 /* There's one dispatch log per CPU. */ #define NR_DTL_PAGE (DISPATCH_LOG_BYTES * CONFIG_NR_CPUS / PAGE_SIZE) --=20 2.54.0.746.g67dd491aae-goog