lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 25 Feb 2014 20:35:19 +0100 From: Petr Tesarik <ptesarik@...e.cz> To: Vivek Goyal <vgoyal@...hat.com> Cc: Borislav Petkov <bp@...en8.de>, mjg59@...f.ucam.org, jkosina@...e.cz, greg@...ah.com, kexec@...ts.infradead.org, linux-kernel@...r.kernel.org, ebiederm@...ssion.com, hpa@...or.com Subject: Re: [PATCH 06/11] kexec: A new system call, kexec_file_load, for in kernel kexec On Mon, 24 Feb 2014 11:41:31 -0500 Vivek Goyal <vgoyal@...hat.com> wrote: > On Fri, Feb 21, 2014 at 03:59:10PM +0100, Borislav Petkov wrote: > >[...] > > > > ... > > > > > diff --git a/include/uapi/linux/kexec.h b/include/uapi/linux/kexec.h > > > index d6629d4..5fddb1b 100644 > > > --- a/include/uapi/linux/kexec.h > > > +++ b/include/uapi/linux/kexec.h > > > @@ -13,6 +13,10 @@ > > > #define KEXEC_PRESERVE_CONTEXT 0x00000002 > > > #define KEXEC_ARCH_MASK 0xffff0000 > > > > > > +/* Kexec file load interface flags */ > > > +#define KEXEC_FILE_UNLOAD 0x00000001 > > > +#define KEXEC_FILE_ON_CRASH 0x00000002 > > > > BIT() > > What's that? #define BIT(nr) (1UL << (nr)) For my part I'm not convinced it's a better way to do it, unless Borislav also wanted to suggest adding an enum for the bit number values... Petr T -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists