diff options
author | Ard Biesheuvel <ardb@kernel.org> | 2023-07-02 11:57:34 +0200 |
---|---|---|
committer | Ard Biesheuvel <ardb@kernel.org> | 2023-08-22 10:39:26 +0200 |
commit | 5894cf571e14fb393a4d0a82538de032127b9d8b (patch) | |
tree | 6dbdfaf1d23db2b428cc0c6a03d59f52764c9350 /security/smack | |
parent | 3c17ae4161093fa2263b70064e34a033dc16fef5 (diff) | |
download | linux-5894cf571e14fb393a4d0a82538de032127b9d8b.tar.gz linux-5894cf571e14fb393a4d0a82538de032127b9d8b.tar.bz2 linux-5894cf571e14fb393a4d0a82538de032127b9d8b.zip |
acpi/prmt: Use EFI runtime sandbox to invoke PRM handlers
Instead of bypassing the kernel's adaptation layer for performing EFI
runtime calls, wire up ACPI PRM handling into it. This means these calls
can no longer occur concurrently with EFI runtime calls, and will be
made from the EFI runtime workqueue. It also means any page faults
occurring during PRM handling will be identified correctly as
originating in firmware code.
Acked-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Diffstat (limited to 'security/smack')
0 files changed, 0 insertions, 0 deletions