lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 15 Feb 2019 07:05:32 -0800 From: tip-bot for Hedi Berriche <tipbot@...or.com> To: linux-tip-commits@...r.kernel.org Cc: linux-efi@...r.kernel.org, ard.biesheuvel@...aro.org, rja@....com, mike.travis@....com, bhsharma@...hat.com, mingo@...hat.com, mingo@...nel.org, bp@...e.de, x86@...nel.org, sivanich@....com, hpa@...or.com, tglx@...utronix.de, steve.wahl@....com, linux-kernel@...r.kernel.org, andy@...radead.org, hedi.berriche@....com, dvhart@...radead.org Subject: [tip:x86/uv] x86/platform/UV: Use efi_enabled() instead of test_bit() Commit-ID: 8945d96f7b3ead56e053ac79b8f7b0de98a30bfe Gitweb: https://git.kernel.org/tip/8945d96f7b3ead56e053ac79b8f7b0de98a30bfe Author: Hedi Berriche <hedi.berriche@....com> AuthorDate: Wed, 13 Feb 2019 19:34:12 +0000 Committer: Borislav Petkov <bp@...e.de> CommitDate: Fri, 15 Feb 2019 15:15:18 +0100 x86/platform/UV: Use efi_enabled() instead of test_bit() Use ad hoc efi_enabled() instead of fiddling with test_bit(). Cleanup, no functional changes. Signed-off-by: Hedi Berriche <hedi.berriche@....com> Signed-off-by: Borislav Petkov <bp@...e.de> Reviewed-by: Ard Biesheuvel <ard.biesheuvel@...aro.org> Reviewed-by: Russ Anderson <rja@....com> Reviewed-by: Dimitri Sivanich <sivanich@....com> Reviewed-by: Mike Travis <mike.travis@....com> Cc: Andy Shevchenko <andy@...radead.org> Cc: Bhupesh Sharma <bhsharma@...hat.com> Cc: Darren Hart <dvhart@...radead.org> Cc: "H. Peter Anvin" <hpa@...or.com> Cc: Ingo Molnar <mingo@...hat.com> Cc: linux-efi <linux-efi@...r.kernel.org> Cc: platform-driver-x86@...r.kernel.org Cc: Steve Wahl <steve.wahl@....com> Cc: Thomas Gleixner <tglx@...utronix.de> Cc: x86-ml <x86@...nel.org> Link: https://lkml.kernel.org/r/20190213193413.25560-4-hedi.berriche@hpe.com --- arch/x86/platform/uv/bios_uv.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/platform/uv/bios_uv.c b/arch/x86/platform/uv/bios_uv.c index 91e3d5285836..38a2e3431fc6 100644 --- a/arch/x86/platform/uv/bios_uv.c +++ b/arch/x86/platform/uv/bios_uv.c @@ -44,7 +44,7 @@ s64 uv_bios_call(enum uv_bios_cmd which, u64 a1, u64 a2, u64 a3, u64 a4, u64 a5) * If EFI_OLD_MEMMAP is set, we need to fall back to using our old EFI * callback method, which uses efi_call() directly, with the kernel page tables: */ - if (unlikely(test_bit(EFI_OLD_MEMMAP, &efi.flags))) + if (unlikely(efi_enabled(EFI_OLD_MEMMAP))) ret = efi_call((void *)__va(tab->function), (u64)which, a1, a2, a3, a4, a5); else ret = efi_call_virt_pointer(tab, function, (u64)which, a1, a2, a3, a4, a5);
Powered by blists - more mailing lists