diff options
| author | David Woodhouse <dwmw2@infradead.org> | 2006-05-03 08:30:35 -0400 |
|---|---|---|
| committer | David Woodhouse <dwmw2@infradead.org> | 2006-05-03 08:30:35 -0400 |
| commit | edc4ff7c08e9885c40e60c4fb39fa42cc91a0602 (patch) | |
| tree | f375d28043dd4457428a841167dc93d760ba9a46 /include/linux | |
| parent | cbb9a56177b16294ed347ba7fcb1c66c8adb5dc4 (diff) | |
| parent | e17df688f7064dae1417ce425dd1e4b71d24d63b (diff) | |
Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6
Diffstat (limited to 'include/linux')
| -rw-r--r-- | include/linux/audit.h | 22 | ||||
| -rw-r--r-- | include/linux/debugfs.h | 5 | ||||
| -rw-r--r-- | include/linux/ide.h | 1 | ||||
| -rw-r--r-- | include/linux/input.h | 109 | ||||
| -rw-r--r-- | include/linux/kobject.h | 3 | ||||
| -rw-r--r-- | include/linux/list.h | 2 | ||||
| -rw-r--r-- | include/linux/memory_hotplug.h | 3 | ||||
| -rw-r--r-- | include/linux/mod_devicetable.h | 48 | ||||
| -rw-r--r-- | include/linux/mv643xx.h | 2 | ||||
| -rw-r--r-- | include/linux/netdevice.h | 18 | ||||
| -rw-r--r-- | include/linux/netfilter/x_tables.h | 12 | ||||
| -rw-r--r-- | include/linux/netlink.h | 1 | ||||
| -rw-r--r-- | include/linux/pagemap.h | 2 | ||||
| -rw-r--r-- | include/linux/pci_ids.h | 4 | ||||
| -rw-r--r-- | include/linux/pipe_fs_i.h | 46 | ||||
| -rw-r--r-- | include/linux/sched.h | 3 | ||||
| -rw-r--r-- | include/linux/security.h | 16 | ||||
| -rw-r--r-- | include/linux/selinux.h | 177 | ||||
| -rw-r--r-- | include/linux/signal.h | 4 | ||||
| -rw-r--r-- | include/linux/skbuff.h | 7 | ||||
| -rw-r--r-- | include/linux/spi/ads7846.h | 7 | ||||
| -rw-r--r-- | include/linux/sunrpc/metrics.h | 12 | ||||
| -rw-r--r-- | include/linux/sunrpc/xprt.h | 1 | ||||
| -rw-r--r-- | include/linux/syscalls.h | 3 |
24 files changed, 407 insertions, 101 deletions
diff --git a/include/linux/audit.h b/include/linux/audit.h index 1c47c59058c1..b74c148f14e3 100644 --- a/include/linux/audit.h +++ b/include/linux/audit.h | |||
| @@ -83,6 +83,7 @@ | |||
| 83 | #define AUDIT_CONFIG_CHANGE 1305 /* Audit system configuration change */ | 83 | #define AUDIT_CONFIG_CHANGE 1305 /* Audit system configuration change */ |
| 84 | #define AUDIT_SOCKADDR 1306 /* sockaddr copied as syscall arg */ | 84 | #define AUDIT_SOCKADDR 1306 /* sockaddr copied as syscall arg */ |
| 85 | #define AUDIT_CWD 1307 /* Current working directory */ | 85 | #define AUDIT_CWD 1307 /* Current working directory */ |
| 86 | #define AUDIT_IPC_SET_PERM 1311 /* IPC new permissions record type */ | ||
| 86 | 87 | ||
| 87 | #define AUDIT_AVC 1400 /* SE Linux avc denial or grant */ | 88 | #define AUDIT_AVC 1400 /* SE Linux avc denial or grant */ |
| 88 | #define AUDIT_SELINUX_ERR 1401 /* Internal SE Linux Errors */ | 89 | #define AUDIT_SELINUX_ERR 1401 /* Internal SE Linux Errors */ |
| @@ -145,6 +146,11 @@ | |||
| 145 | #define AUDIT_PERS 10 | 146 | #define AUDIT_PERS 10 |
| 146 | #define AUDIT_ARCH 11 | 147 | #define AUDIT_ARCH 11 |
| 147 | #define AUDIT_MSGTYPE 12 | 148 | #define AUDIT_MSGTYPE 12 |
| 149 | #define AUDIT_SE_USER 13 /* security label user */ | ||
| 150 | #define AUDIT_SE_ROLE 14 /* security label role */ | ||
| 151 | #define AUDIT_SE_TYPE 15 /* security label type */ | ||
| 152 | #define AUDIT_SE_SEN 16 /* security label sensitivity label */ | ||
| 153 | #define AUDIT_SE_CLR 17 /* security label clearance label */ | ||
| 148 | 154 | ||
| 149 | /* These are ONLY useful when checking | 155 | /* These are ONLY useful when checking |
| 150 | * at syscall exit time (AUDIT_AT_EXIT). */ | 156 | * at syscall exit time (AUDIT_AT_EXIT). */ |
| @@ -287,10 +293,10 @@ struct netlink_skb_parms; | |||
| 287 | /* Public API */ | 293 | /* Public API */ |
| 288 | extern int audit_alloc(struct task_struct *task); | 294 | extern int audit_alloc(struct task_struct *task); |
| 289 | extern void audit_free(struct task_struct *task); | 295 | extern void audit_free(struct task_struct *task); |
| 290 | extern void audit_syscall_entry(struct task_struct *task, int arch, | 296 | extern void audit_syscall_entry(int arch, |
| 291 | int major, unsigned long a0, unsigned long a1, | 297 | int major, unsigned long a0, unsigned long a1, |
| 292 | unsigned long a2, unsigned long a3); | 298 | unsigned long a2, unsigned long a3); |
| 293 | extern void audit_syscall_exit(struct task_struct *task, int failed, long return_code); | 299 | extern void audit_syscall_exit(int failed, long return_code); |
| 294 | extern void audit_getname(const char *name); | 300 | extern void audit_getname(const char *name); |
| 295 | extern void audit_putname(const char *name); | 301 | extern void audit_putname(const char *name); |
| 296 | extern void __audit_inode(const char *name, const struct inode *inode, unsigned flags); | 302 | extern void __audit_inode(const char *name, const struct inode *inode, unsigned flags); |
| @@ -314,7 +320,8 @@ extern void auditsc_get_stamp(struct audit_context *ctx, | |||
| 314 | struct timespec *t, unsigned int *serial); | 320 | struct timespec *t, unsigned int *serial); |
| 315 | extern int audit_set_loginuid(struct task_struct *task, uid_t loginuid); | 321 | extern int audit_set_loginuid(struct task_struct *task, uid_t loginuid); |
| 316 | extern uid_t audit_get_loginuid(struct audit_context *ctx); | 322 | extern uid_t audit_get_loginuid(struct audit_context *ctx); |
| 317 | extern int audit_ipc_perms(unsigned long qbytes, uid_t uid, gid_t gid, mode_t mode, struct kern_ipc_perm *ipcp); | 323 | extern int audit_ipc_obj(struct kern_ipc_perm *ipcp); |
| 324 | extern int audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, mode_t mode, struct kern_ipc_perm *ipcp); | ||
| 318 | extern int audit_socketcall(int nargs, unsigned long *args); | 325 | extern int audit_socketcall(int nargs, unsigned long *args); |
| 319 | extern int audit_sockaddr(int len, void *addr); | 326 | extern int audit_sockaddr(int len, void *addr); |
| 320 | extern int audit_avc_path(struct dentry *dentry, struct vfsmount *mnt); | 327 | extern int audit_avc_path(struct dentry *dentry, struct vfsmount *mnt); |
| @@ -323,8 +330,8 @@ extern int audit_set_macxattr(const char *name); | |||
| 323 | #else | 330 | #else |
| 324 | #define audit_alloc(t) ({ 0; }) | 331 | #define audit_alloc(t) ({ 0; }) |
| 325 | #define audit_free(t) do { ; } while (0) | 332 | #define audit_free(t) do { ; } while (0) |
| 326 | #define audit_syscall_entry(t,ta,a,b,c,d,e) do { ; } while (0) | 333 | #define audit_syscall_entry(ta,a,b,c,d,e) do { ; } while (0) |
| 327 | #define audit_syscall_exit(t,f,r) do { ; } while (0) | 334 | #define audit_syscall_exit(f,r) do { ; } while (0) |
| 328 | #define audit_getname(n) do { ; } while (0) | 335 | #define audit_getname(n) do { ; } while (0) |
| 329 | #define audit_putname(n) do { ; } while (0) | 336 | #define audit_putname(n) do { ; } while (0) |
| 330 | #define __audit_inode(n,i,f) do { ; } while (0) | 337 | #define __audit_inode(n,i,f) do { ; } while (0) |
| @@ -333,7 +340,8 @@ extern int audit_set_macxattr(const char *name); | |||
| 333 | #define audit_inode_child(d,i,p) do { ; } while (0) | 340 | #define audit_inode_child(d,i,p) do { ; } while (0) |
| 334 | #define auditsc_get_stamp(c,t,s) do { BUG(); } while (0) | 341 | #define auditsc_get_stamp(c,t,s) do { BUG(); } while (0) |
| 335 | #define audit_get_loginuid(c) ({ -1; }) | 342 | #define audit_get_loginuid(c) ({ -1; }) |
| 336 | #define audit_ipc_perms(q,u,g,m,i) ({ 0; }) | 343 | #define audit_ipc_obj(i) ({ 0; }) |
| 344 | #define audit_ipc_set_perm(q,u,g,m,i) ({ 0; }) | ||
| 337 | #define audit_socketcall(n,a) ({ 0; }) | 345 | #define audit_socketcall(n,a) ({ 0; }) |
| 338 | #define audit_sockaddr(len, addr) ({ 0; }) | 346 | #define audit_sockaddr(len, addr) ({ 0; }) |
| 339 | #define audit_avc_path(dentry, mnt) ({ 0; }) | 347 | #define audit_avc_path(dentry, mnt) ({ 0; }) |
| @@ -366,7 +374,7 @@ extern void audit_log_d_path(struct audit_buffer *ab, | |||
| 366 | extern int audit_filter_user(struct netlink_skb_parms *cb, int type); | 374 | extern int audit_filter_user(struct netlink_skb_parms *cb, int type); |
| 367 | extern int audit_filter_type(int type); | 375 | extern int audit_filter_type(int type); |
| 368 | extern int audit_receive_filter(int type, int pid, int uid, int seq, | 376 | extern int audit_receive_filter(int type, int pid, int uid, int seq, |
| 369 | void *data, size_t datasz, uid_t loginuid); | 377 | void *data, size_t datasz, uid_t loginuid, u32 sid); |
| 370 | #else | 378 | #else |
| 371 | #define audit_log(c,g,t,f,...) do { ; } while (0) | 379 | #define audit_log(c,g,t,f,...) do { ; } while (0) |
| 372 | #define audit_log_start(c,g,t) ({ NULL; }) | 380 | #define audit_log_start(c,g,t) ({ NULL; }) |
diff --git a/include/linux/debugfs.h b/include/linux/debugfs.h index 176e2d371577..047567d34ca7 100644 --- a/include/linux/debugfs.h +++ b/include/linux/debugfs.h | |||
| @@ -58,9 +58,8 @@ struct dentry *debugfs_create_blob(const char *name, mode_t mode, | |||
| 58 | */ | 58 | */ |
| 59 | 59 | ||
| 60 | static inline struct dentry *debugfs_create_file(const char *name, mode_t mode, | 60 | static inline struct dentry *debugfs_create_file(const char *name, mode_t mode, |
| 61 | struct dentry *parent, | 61 | struct dentry *parent, void *data, |
| 62 | void *data, | 62 | const struct file_operations *fops) |
| 63 | struct file_operations *fops) | ||
| 64 | { | 63 | { |
| 65 | return ERR_PTR(-ENODEV); | 64 | return ERR_PTR(-ENODEV); |
| 66 | } | 65 | } |
diff --git a/include/linux/ide.h b/include/linux/ide.h index 8d2db412ba9c..a8bef1d1371c 100644 --- a/include/linux/ide.h +++ b/include/linux/ide.h | |||
| @@ -1220,7 +1220,6 @@ typedef struct ide_pci_enablebit_s { | |||
| 1220 | enum { | 1220 | enum { |
| 1221 | /* Uses ISA control ports not PCI ones. */ | 1221 | /* Uses ISA control ports not PCI ones. */ |
| 1222 | IDEPCI_FLAG_ISA_PORTS = (1 << 0), | 1222 | IDEPCI_FLAG_ISA_PORTS = (1 << 0), |
| 1223 | IDEPCI_FLAG_FORCE_PDC = (1 << 1), | ||
| 1224 | }; | 1223 | }; |
| 1225 | 1224 | ||
| 1226 | typedef struct ide_pci_device_s { | 1225 | typedef struct ide_pci_device_s { |
diff --git a/include/linux/input.h b/include/linux/input.h index b0e612dda0cf..50e338d2ffda 100644 --- a/include/linux/input.h +++ b/include/linux/input.h | |||
| @@ -12,8 +12,6 @@ | |||
| 12 | #ifdef __KERNEL__ | 12 | #ifdef __KERNEL__ |
| 13 | #include <linux/time.h> | 13 | #include <linux/time.h> |
| 14 | #include <linux/list.h> | 14 | #include <linux/list.h> |
| 15 | #include <linux/device.h> | ||
| 16 | #include <linux/mod_devicetable.h> | ||
| 17 | #else | 15 | #else |
| 18 | #include <sys/time.h> | 16 | #include <sys/time.h> |
| 19 | #include <sys/ioctl.h> | 17 | #include <sys/ioctl.h> |
| @@ -58,6 +56,8 @@ struct input_absinfo { | |||
| 58 | 56 | ||
| 59 | #define EVIOCGVERSION _IOR('E', 0x01, int) /* get driver version */ | 57 | #define EVIOCGVERSION _IOR('E', 0x01, int) /* get driver version */ |
| 60 | #define EVIOCGID _IOR('E', 0x02, struct input_id) /* get device ID */ | 58 | #define EVIOCGID _IOR('E', 0x02, struct input_id) /* get device ID */ |
| 59 | #define EVIOCGREP _IOR('E', 0x03, int[2]) /* get repeat settings */ | ||
| 60 | #define EVIOCSREP _IOW('E', 0x03, int[2]) /* set repeat settings */ | ||
| 61 | #define EVIOCGKEYCODE _IOR('E', 0x04, int[2]) /* get keycode */ | 61 | #define EVIOCGKEYCODE _IOR('E', 0x04, int[2]) /* get keycode */ |
| 62 | #define EVIOCSKEYCODE _IOW('E', 0x04, int[2]) /* set keycode */ | 62 | #define EVIOCSKEYCODE _IOW('E', 0x04, int[2]) /* set keycode */ |
| 63 | 63 | ||
| @@ -577,15 +577,15 @@ struct input_absinfo { | |||
| 577 | * Switch events | 577 | * Switch events |
| 578 | */ | 578 | */ |
| 579 | 579 | ||
| 580 | #define SW_0 0x00 | 580 | #define SW_0 0x00 |
| 581 | #define SW_1 0x01 | 581 | #define SW_1 0x01 |
| 582 | #define SW_2 0x02 | 582 | #define SW_2 0x02 |
| 583 | #define SW_3 0x03 | 583 | #define SW_3 0x03 |
| 584 | #define SW_4 0x04 | 584 | #define SW_4 0x04 |
| 585 | #define SW_5 0x05 | 585 | #define SW_5 0x05 |
| 586 | #define SW_6 0x06 | 586 | #define SW_6 0x06 |
| 587 | #define SW_7 0x07 | 587 | #define SW_7 0x07 |
| 588 | #define SW_MAX 0x0f | 588 | #define SW_MAX 0x0f |
| 589 | 589 | ||
| 590 | /* | 590 | /* |
| 591 | * Misc events | 591 | * Misc events |
| @@ -805,52 +805,16 @@ struct ff_effect { | |||
| 805 | 805 | ||
| 806 | #define FF_MAX 0x7f | 806 | #define FF_MAX 0x7f |
| 807 | 807 | ||
| 808 | struct input_device_id { | ||
| 809 | |||
| 810 | kernel_ulong_t flags; | ||
| 811 | |||
| 812 | struct input_id id; | ||
| 813 | |||
| 814 | kernel_ulong_t evbit[EV_MAX/BITS_PER_LONG+1]; | ||
| 815 | kernel_ulong_t keybit[KEY_MAX/BITS_PER_LONG+1]; | ||
| 816 | kernel_ulong_t relbit[REL_MAX/BITS_PER_LONG+1]; | ||
| 817 | kernel_ulong_t absbit[ABS_MAX/BITS_PER_LONG+1]; | ||
| 818 | kernel_ulong_t mscbit[MSC_MAX/BITS_PER_LONG+1]; | ||
| 819 | kernel_ulong_t ledbit[LED_MAX/BITS_PER_LONG+1]; | ||
| 820 | kernel_ulong_t sndbit[SND_MAX/BITS_PER_LONG+1]; | ||
| 821 | kernel_ulong_t ffbit[FF_MAX/BITS_PER_LONG+1]; | ||
| 822 | kernel_ulong_t swbit[SW_MAX/BITS_PER_LONG+1]; | ||
| 823 | |||
| 824 | kernel_ulong_t driver_info; | ||
| 825 | }; | ||
| 826 | |||
| 827 | /* | ||
| 828 | * Structure for hotplug & device<->driver matching. | ||
| 829 | */ | ||
| 830 | |||
| 831 | #define INPUT_DEVICE_ID_MATCH_BUS 1 | ||
| 832 | #define INPUT_DEVICE_ID_MATCH_VENDOR 2 | ||
| 833 | #define INPUT_DEVICE_ID_MATCH_PRODUCT 4 | ||
| 834 | #define INPUT_DEVICE_ID_MATCH_VERSION 8 | ||
| 835 | |||
| 836 | #define INPUT_DEVICE_ID_MATCH_EVBIT 0x010 | ||
| 837 | #define INPUT_DEVICE_ID_MATCH_KEYBIT 0x020 | ||
| 838 | #define INPUT_DEVICE_ID_MATCH_RELBIT 0x040 | ||
| 839 | #define INPUT_DEVICE_ID_MATCH_ABSBIT 0x080 | ||
| 840 | #define INPUT_DEVICE_ID_MATCH_MSCIT 0x100 | ||
| 841 | #define INPUT_DEVICE_ID_MATCH_LEDBIT 0x200 | ||
| 842 | #define INPUT_DEVICE_ID_MATCH_SNDBIT 0x400 | ||
| 843 | #define INPUT_DEVICE_ID_MATCH_FFBIT 0x800 | ||
| 844 | #define INPUT_DEVICE_ID_MATCH_SWBIT 0x1000 | ||
| 845 | |||
| 846 | #ifdef __KERNEL__ | 808 | #ifdef __KERNEL__ |
| 847 | 809 | ||
| 848 | /* | 810 | /* |
| 849 | * In-kernel definitions. | 811 | * In-kernel definitions. |
| 850 | */ | 812 | */ |
| 851 | 813 | ||
| 814 | #include <linux/device.h> | ||
| 852 | #include <linux/fs.h> | 815 | #include <linux/fs.h> |
| 853 | #include <linux/timer.h> | 816 | #include <linux/timer.h> |
| 817 | #include <linux/mod_devicetable.h> | ||
| 854 | 818 | ||
| 855 | #define NBITS(x) (((x)/BITS_PER_LONG)+1) | 819 | #define NBITS(x) (((x)/BITS_PER_LONG)+1) |
| 856 | #define BIT(x) (1UL<<((x)%BITS_PER_LONG)) | 820 | #define BIT(x) (1UL<<((x)%BITS_PER_LONG)) |
| @@ -951,9 +915,49 @@ struct input_dev { | |||
| 951 | }; | 915 | }; |
| 952 | #define to_input_dev(d) container_of(d, struct input_dev, cdev) | 916 | #define to_input_dev(d) container_of(d, struct input_dev, cdev) |
| 953 | 917 | ||
| 954 | #define INPUT_DEVICE_ID_MATCH_DEVICE\ | 918 | /* |
| 919 | * Verify that we are in sync with input_device_id mod_devicetable.h #defines | ||
| 920 | */ | ||
| 921 | |||
| 922 | #if EV_MAX != INPUT_DEVICE_ID_EV_MAX | ||
| 923 | #error "EV_MAX and INPUT_DEVICE_ID_EV_MAX do not match" | ||
| 924 | #endif | ||
| 925 | |||
| 926 | #if KEY_MAX != INPUT_DEVICE_ID_KEY_MAX | ||
| 927 | #error "KEY_MAX and INPUT_DEVICE_ID_KEY_MAX do not match" | ||
| 928 | #endif | ||
| 929 | |||
| 930 | #if REL_MAX != INPUT_DEVICE_ID_REL_MAX | ||
| 931 | #error "REL_MAX and INPUT_DEVICE_ID_REL_MAX do not match" | ||
| 932 | #endif | ||
| 933 | |||
| 934 | #if ABS_MAX != INPUT_DEVICE_ID_ABS_MAX | ||
| 935 | #error "ABS_MAX and INPUT_DEVICE_ID_ABS_MAX do not match" | ||
| 936 | #endif | ||
| 937 | |||
| 938 | #if MSC_MAX != INPUT_DEVICE_ID_MSC_MAX | ||
| 939 | #error "MSC_MAX and INPUT_DEVICE_ID_MSC_MAX do not match" | ||
| 940 | #endif | ||
| 941 | |||
| 942 | #if LED_MAX != INPUT_DEVICE_ID_LED_MAX | ||
| 943 | #error "LED_MAX and INPUT_DEVICE_ID_LED_MAX do not match" | ||
| 944 | #endif | ||
| 945 | |||
| 946 | #if SND_MAX != INPUT_DEVICE_ID_SND_MAX | ||
| 947 | #error "SND_MAX and INPUT_DEVICE_ID_SND_MAX do not match" | ||
| 948 | #endif | ||
| 949 | |||
| 950 | #if FF_MAX != INPUT_DEVICE_ID_FF_MAX | ||
| 951 | #error "FF_MAX and INPUT_DEVICE_ID_FF_MAX do not match" | ||
| 952 | #endif | ||
| 953 | |||
| 954 | #if SW_MAX != INPUT_DEVICE_ID_SW_MAX | ||
| 955 | #error "SW_MAX and INPUT_DEVICE_ID_SW_MAX do not match" | ||
| 956 | #endif | ||
| 957 | |||
| 958 | #define INPUT_DEVICE_ID_MATCH_DEVICE \ | ||
| 955 | (INPUT_DEVICE_ID_MATCH_BUS | INPUT_DEVICE_ID_MATCH_VENDOR | INPUT_DEVICE_ID_MATCH_PRODUCT) | 959 | (INPUT_DEVICE_ID_MATCH_BUS | INPUT_DEVICE_ID_MATCH_VENDOR | INPUT_DEVICE_ID_MATCH_PRODUCT) |
| 956 | #define INPUT_DEVICE_ID_MATCH_DEVICE_AND_VERSION\ | 960 | #define INPUT_DEVICE_ID_MATCH_DEVICE_AND_VERSION \ |
| 957 | (INPUT_DEVICE_ID_MATCH_DEVICE | INPUT_DEVICE_ID_MATCH_VERSION) | 961 | (INPUT_DEVICE_ID_MATCH_DEVICE | INPUT_DEVICE_ID_MATCH_VERSION) |
| 958 | 962 | ||
| 959 | struct input_handle; | 963 | struct input_handle; |
| @@ -1016,7 +1020,8 @@ static inline void input_put_device(struct input_dev *dev) | |||
| 1016 | 1020 | ||
| 1017 | static inline void input_free_device(struct input_dev *dev) | 1021 | static inline void input_free_device(struct input_dev *dev) |
| 1018 | { | 1022 | { |
| 1019 | input_put_device(dev); | 1023 | if (dev) |
| 1024 | input_put_device(dev); | ||
| 1020 | } | 1025 | } |
| 1021 | 1026 | ||
| 1022 | int input_register_device(struct input_dev *); | 1027 | int input_register_device(struct input_dev *); |
diff --git a/include/linux/kobject.h b/include/linux/kobject.h index dcd0623be892..c187c53cecd0 100644 --- a/include/linux/kobject.h +++ b/include/linux/kobject.h | |||
| @@ -257,9 +257,8 @@ struct subsys_attribute { | |||
| 257 | }; | 257 | }; |
| 258 | 258 | ||
| 259 | extern int subsys_create_file(struct subsystem * , struct subsys_attribute *); | 259 | extern int subsys_create_file(struct subsystem * , struct subsys_attribute *); |
| 260 | extern void subsys_remove_file(struct subsystem * , struct subsys_attribute *); | ||
| 261 | 260 | ||
| 262 | #if defined(CONFIG_HOTPLUG) && defined(CONFIG_NET) | 261 | #if defined(CONFIG_HOTPLUG) |
| 263 | void kobject_uevent(struct kobject *kobj, enum kobject_action action); | 262 | void kobject_uevent(struct kobject *kobj, enum kobject_action action); |
| 264 | 263 | ||
| 265 | int add_uevent_var(char **envp, int num_envp, int *cur_index, | 264 | int add_uevent_var(char **envp, int num_envp, int *cur_index, |
diff --git a/include/linux/list.h b/include/linux/list.h index 67258b47e9ca..76f05718342c 100644 --- a/include/linux/list.h +++ b/include/linux/list.h | |||
| @@ -619,7 +619,7 @@ static inline void hlist_del_rcu(struct hlist_node *n) | |||
| 619 | 619 | ||
| 620 | static inline void hlist_del_init(struct hlist_node *n) | 620 | static inline void hlist_del_init(struct hlist_node *n) |
| 621 | { | 621 | { |
| 622 | if (n->pprev) { | 622 | if (!hlist_unhashed(n)) { |
| 623 | __hlist_del(n); | 623 | __hlist_del(n); |
| 624 | INIT_HLIST_NODE(n); | 624 | INIT_HLIST_NODE(n); |
| 625 | } | 625 | } |
diff --git a/include/linux/memory_hotplug.h b/include/linux/memory_hotplug.h index 4ca3e6ad03ec..911206386171 100644 --- a/include/linux/memory_hotplug.h +++ b/include/linux/memory_hotplug.h | |||
| @@ -99,10 +99,7 @@ static inline int __remove_pages(struct zone *zone, unsigned long start_pfn, | |||
| 99 | return -ENOSYS; | 99 | return -ENOSYS; |
| 100 | } | 100 | } |
| 101 | 101 | ||
| 102 | #if defined(CONFIG_MEMORY_HOTPLUG) || defined(CONFIG_ACPI_HOTPLUG_MEMORY) \ | ||
| 103 | || defined(CONFIG_ACPI_HOTPLUG_MEMORY_MODULE) | ||
| 104 | extern int add_memory(u64 start, u64 size); | 102 | extern int add_memory(u64 start, u64 size); |
| 105 | extern int remove_memory(u64 start, u64 size); | 103 | extern int remove_memory(u64 start, u64 size); |
| 106 | #endif | ||
| 107 | 104 | ||
| 108 | #endif /* __LINUX_MEMORY_HOTPLUG_H */ | 105 | #endif /* __LINUX_MEMORY_HOTPLUG_H */ |
diff --git a/include/linux/mod_devicetable.h b/include/linux/mod_devicetable.h index 7b08c11ec4cc..f6977708585c 100644 --- a/include/linux/mod_devicetable.h +++ b/include/linux/mod_devicetable.h | |||
| @@ -249,4 +249,52 @@ struct i2c_device_id { | |||
| 249 | __u16 id; | 249 | __u16 id; |
| 250 | }; | 250 | }; |
| 251 | 251 | ||
| 252 | /* Input */ | ||
| 253 | #define INPUT_DEVICE_ID_EV_MAX 0x1f | ||
| 254 | #define INPUT_DEVICE_ID_KEY_MAX 0x1ff | ||
| 255 | #define INPUT_DEVICE_ID_REL_MAX 0x0f | ||
| 256 | #define INPUT_DEVICE_ID_ABS_MAX 0x3f | ||
| 257 | #define INPUT_DEVICE_ID_MSC_MAX 0x07 | ||
| 258 | #define INPUT_DEVICE_ID_LED_MAX 0x0f | ||
| 259 | #define INPUT_DEVICE_ID_SND_MAX 0x07 | ||
| 260 | #define INPUT_DEVICE_ID_FF_MAX 0x7f | ||
| 261 | #define INPUT_DEVICE_ID_SW_MAX 0x0f | ||
| 262 | |||
| 263 | #define INPUT_DEVICE_ID_MATCH_BUS 1 | ||
| 264 | #define INPUT_DEVICE_ID_MATCH_VENDOR 2 | ||
| 265 | #define INPUT_DEVICE_ID_MATCH_PRODUCT 4 | ||
| 266 | #define INPUT_DEVICE_ID_MATCH_VERSION 8 | ||
| 267 | |||
| 268 | #define INPUT_DEVICE_ID_MATCH_EVBIT 0x0010 | ||
| 269 | #define INPUT_DEVICE_ID_MATCH_KEYBIT 0x0020 | ||
| 270 | #define INPUT_DEVICE_ID_MATCH_RELBIT 0x0040 | ||
| 271 | #define INPUT_DEVICE_ID_MATCH_ABSBIT 0x0080 | ||
| 272 | #define INPUT_DEVICE_ID_MATCH_MSCIT 0x0100 | ||
| 273 | #define INPUT_DEVICE_ID_MATCH_LEDBIT 0x0200 | ||
| 274 | #define INPUT_DEVICE_ID_MATCH_SNDBIT 0x0400 | ||
| 275 | #define INPUT_DEVICE_ID_MATCH_FFBIT 0x0800 | ||
| 276 | #define INPUT_DEVICE_ID_MATCH_SWBIT 0x1000 | ||
| 277 | |||
| 278 | struct input_device_id { | ||
| 279 | |||
| 280 | kernel_ulong_t flags; | ||
| 281 | |||
| 282 | __u16 bustype; | ||
| 283 | __u16 vendor; | ||
| 284 | __u16 product; | ||
| 285 | __u16 version; | ||
| 286 | |||
| 287 | kernel_ulong_t evbit[INPUT_DEVICE_ID_EV_MAX / BITS_PER_LONG + 1]; | ||
| 288 | kernel_ulong_t keybit[INPUT_DEVICE_ID_KEY_MAX / BITS_PER_LONG + 1]; | ||
| 289 | kernel_ulong_t relbit[INPUT_DEVICE_ID_REL_MAX / BITS_PER_LONG + 1]; | ||
| 290 | kernel_ulong_t absbit[INPUT_DEVICE_ID_ABS_MAX / BITS_PER_LONG + 1]; | ||
| 291 | kernel_ulong_t mscbit[INPUT_DEVICE_ID_MSC_MAX / BITS_PER_LONG + 1]; | ||
| 292 | kernel_ulong_t ledbit[INPUT_DEVICE_ID_LED_MAX / BITS_PER_LONG + 1]; | ||
| 293 | kernel_ulong_t sndbit[INPUT_DEVICE_ID_SND_MAX / BITS_PER_LONG + 1]; | ||
| 294 | kernel_ulong_t ffbit[INPUT_DEVICE_ID_FF_MAX / BITS_PER_LONG + 1]; | ||
| 295 | kernel_ulong_t swbit[INPUT_DEVICE_ID_SW_MAX / BITS_PER_LONG + 1]; | ||
| 296 | |||
| 297 | kernel_ulong_t driver_info; | ||
| 298 | }; | ||
| 299 | |||
| 252 | #endif /* LINUX_MOD_DEVICETABLE_H */ | 300 | #endif /* LINUX_MOD_DEVICETABLE_H */ |
diff --git a/include/linux/mv643xx.h b/include/linux/mv643xx.h index 955d3069d727..edfa012fad3a 100644 --- a/include/linux/mv643xx.h +++ b/include/linux/mv643xx.h | |||
| @@ -13,7 +13,7 @@ | |||
| 13 | #ifndef __ASM_MV643XX_H | 13 | #ifndef __ASM_MV643XX_H |
| 14 | #define __ASM_MV643XX_H | 14 | #define __ASM_MV643XX_H |
| 15 | 15 | ||
| 16 | #ifdef __MIPS__ | 16 | #ifdef __mips__ |
| 17 | #include <asm/addrspace.h> | 17 | #include <asm/addrspace.h> |
| 18 | #include <asm/marvell.h> | 18 | #include <asm/marvell.h> |
| 19 | #endif | 19 | #endif |
diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h index 40ccf8cc4239..01db7b88a2b1 100644 --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h | |||
| @@ -829,19 +829,21 @@ static inline void netif_rx_schedule(struct net_device *dev) | |||
| 829 | __netif_rx_schedule(dev); | 829 | __netif_rx_schedule(dev); |
| 830 | } | 830 | } |
| 831 | 831 | ||
| 832 | /* Try to reschedule poll. Called by dev->poll() after netif_rx_complete(). | 832 | |
| 833 | * Do not inline this? | 833 | static inline void __netif_rx_reschedule(struct net_device *dev, int undo) |
| 834 | */ | 834 | { |
| 835 | dev->quota += undo; | ||
| 836 | list_add_tail(&dev->poll_list, &__get_cpu_var(softnet_data).poll_list); | ||
| 837 | __raise_softirq_irqoff(NET_RX_SOFTIRQ); | ||
| 838 | } | ||
| 839 | |||
| 840 | /* Try to reschedule poll. Called by dev->poll() after netif_rx_complete(). */ | ||
| 835 | static inline int netif_rx_reschedule(struct net_device *dev, int undo) | 841 | static inline int netif_rx_reschedule(struct net_device *dev, int undo) |
| 836 | { | 842 | { |
| 837 | if (netif_rx_schedule_prep(dev)) { | 843 | if (netif_rx_schedule_prep(dev)) { |
| 838 | unsigned long flags; | 844 | unsigned long flags; |
| 839 | |||
| 840 | dev->quota += undo; | ||
| 841 | |||
| 842 | local_irq_save(flags); | 845 | local_irq_save(flags); |
| 843 | list_add_tail(&dev->poll_list, &__get_cpu_var(softnet_data).poll_list); | 846 | __netif_rx_reschedule(dev, undo); |
| 844 | __raise_softirq_irqoff(NET_RX_SOFTIRQ); | ||
| 845 | local_irq_restore(flags); | 847 | local_irq_restore(flags); |
| 846 | return 1; | 848 | return 1; |
| 847 | } | 849 | } |
diff --git a/include/linux/netfilter/x_tables.h b/include/linux/netfilter/x_tables.h index f6bdef82a322..48cc32d83f77 100644 --- a/include/linux/netfilter/x_tables.h +++ b/include/linux/netfilter/x_tables.h | |||
| @@ -337,6 +337,10 @@ struct compat_xt_entry_match | |||
| 337 | char name[XT_FUNCTION_MAXNAMELEN - 1]; | 337 | char name[XT_FUNCTION_MAXNAMELEN - 1]; |
| 338 | u_int8_t revision; | 338 | u_int8_t revision; |
| 339 | } user; | 339 | } user; |
| 340 | struct { | ||
| 341 | u_int16_t match_size; | ||
| 342 | compat_uptr_t match; | ||
| 343 | } kernel; | ||
| 340 | u_int16_t match_size; | 344 | u_int16_t match_size; |
| 341 | } u; | 345 | } u; |
| 342 | unsigned char data[0]; | 346 | unsigned char data[0]; |
| @@ -350,6 +354,10 @@ struct compat_xt_entry_target | |||
| 350 | char name[XT_FUNCTION_MAXNAMELEN - 1]; | 354 | char name[XT_FUNCTION_MAXNAMELEN - 1]; |
| 351 | u_int8_t revision; | 355 | u_int8_t revision; |
| 352 | } user; | 356 | } user; |
| 357 | struct { | ||
| 358 | u_int16_t target_size; | ||
| 359 | compat_uptr_t target; | ||
| 360 | } kernel; | ||
| 353 | u_int16_t target_size; | 361 | u_int16_t target_size; |
| 354 | } u; | 362 | } u; |
| 355 | unsigned char data[0]; | 363 | unsigned char data[0]; |
| @@ -361,7 +369,11 @@ struct compat_xt_entry_target | |||
| 361 | 369 | ||
| 362 | struct compat_xt_counters | 370 | struct compat_xt_counters |
| 363 | { | 371 | { |
| 372 | #if defined(CONFIG_X86_64) || defined(CONFIG_IA64) | ||
| 364 | u_int32_t cnt[4]; | 373 | u_int32_t cnt[4]; |
| 374 | #else | ||
| 375 | u_int64_t cnt[2]; | ||
| 376 | #endif | ||
| 365 | }; | 377 | }; |
| 366 | 378 | ||
| 367 | struct compat_xt_counters_info | 379 | struct compat_xt_counters_info |
diff --git a/include/linux/netlink.h b/include/linux/netlink.h index f8f3d1c927f8..87b8a5703ebc 100644 --- a/include/linux/netlink.h +++ b/include/linux/netlink.h | |||
| @@ -143,6 +143,7 @@ struct netlink_skb_parms | |||
| 143 | __u32 dst_group; | 143 | __u32 dst_group; |
| 144 | kernel_cap_t eff_cap; | 144 | kernel_cap_t eff_cap; |
| 145 | __u32 loginuid; /* Login (audit) uid */ | 145 | __u32 loginuid; /* Login (audit) uid */ |
| 146 | __u32 sid; /* SELinux security id */ | ||
| 146 | }; | 147 | }; |
| 147 | 148 | ||
| 148 | #define NETLINK_CB(skb) (*(struct netlink_skb_parms*)&((skb)->cb)) | 149 | #define NETLINK_CB(skb) (*(struct netlink_skb_parms*)&((skb)->cb)) |
diff --git a/include/linux/pagemap.h b/include/linux/pagemap.h index 9539efd4f7e6..7a1af574dedf 100644 --- a/include/linux/pagemap.h +++ b/include/linux/pagemap.h | |||
| @@ -78,6 +78,8 @@ extern struct page * find_or_create_page(struct address_space *mapping, | |||
| 78 | unsigned long index, gfp_t gfp_mask); | 78 | unsigned long index, gfp_t gfp_mask); |
| 79 | unsigned find_get_pages(struct address_space *mapping, pgoff_t start, | 79 | unsigned find_get_pages(struct address_space *mapping, pgoff_t start, |
| 80 | unsigned int nr_pages, struct page **pages); | 80 | unsigned int nr_pages, struct page **pages); |
| 81 | unsigned find_get_pages_contig(struct address_space *mapping, pgoff_t start, | ||
| 82 | unsigned int nr_pages, struct page **pages); | ||
| 81 | unsigned find_get_pages_tag(struct address_space *mapping, pgoff_t *index, | 83 | unsigned find_get_pages_tag(struct address_space *mapping, pgoff_t *index, |
| 82 | int tag, unsigned int nr_pages, struct page **pages); | 84 | int tag, unsigned int nr_pages, struct page **pages); |
| 83 | 85 | ||
diff --git a/include/linux/pci_ids.h b/include/linux/pci_ids.h index 8d03e10212f5..d6fe048376ab 100644 --- a/include/linux/pci_ids.h +++ b/include/linux/pci_ids.h | |||
| @@ -356,6 +356,10 @@ | |||
| 356 | #define PCI_DEVICE_ID_ATI_IXP300_SATA 0x436e | 356 | #define PCI_DEVICE_ID_ATI_IXP300_SATA 0x436e |
| 357 | #define PCI_DEVICE_ID_ATI_IXP400_IDE 0x4376 | 357 | #define PCI_DEVICE_ID_ATI_IXP400_IDE 0x4376 |
| 358 | #define PCI_DEVICE_ID_ATI_IXP400_SATA 0x4379 | 358 | #define PCI_DEVICE_ID_ATI_IXP400_SATA 0x4379 |
| 359 | #define PCI_DEVICE_ID_ATI_IXP400_SATA2 0x437a | ||
| 360 | #define PCI_DEVICE_ID_ATI_IXP600_SATA 0x4380 | ||
| 361 | #define PCI_DEVICE_ID_ATI_IXP600_SRAID 0x4381 | ||
| 362 | #define PCI_DEVICE_ID_ATI_IXP600_IDE 0x438c | ||
| 359 | 363 | ||
| 360 | #define PCI_VENDOR_ID_VLSI 0x1004 | 364 | #define PCI_VENDOR_ID_VLSI 0x1004 |
| 361 | #define PCI_DEVICE_ID_VLSI_82C592 0x0005 | 365 | #define PCI_DEVICE_ID_VLSI_82C592 0x0005 |
diff --git a/include/linux/pipe_fs_i.h b/include/linux/pipe_fs_i.h index ef7f33c0be19..ba73108cbf8b 100644 --- a/include/linux/pipe_fs_i.h +++ b/include/linux/pipe_fs_i.h | |||
| @@ -5,8 +5,8 @@ | |||
| 5 | 5 | ||
| 6 | #define PIPE_BUFFERS (16) | 6 | #define PIPE_BUFFERS (16) |
| 7 | 7 | ||
| 8 | #define PIPE_BUF_FLAG_STOLEN 0x01 | 8 | #define PIPE_BUF_FLAG_ATOMIC 0x01 /* was atomically mapped */ |
| 9 | #define PIPE_BUF_FLAG_LRU 0x02 | 9 | #define PIPE_BUF_FLAG_GIFT 0x02 /* page is a gift */ |
| 10 | 10 | ||
| 11 | struct pipe_buffer { | 11 | struct pipe_buffer { |
| 12 | struct page *page; | 12 | struct page *page; |
| @@ -15,10 +15,23 @@ struct pipe_buffer { | |||
| 15 | unsigned int flags; | 15 | unsigned int flags; |
| 16 | }; | 16 | }; |
| 17 | 17 | ||
| 18 | /* | ||
| 19 | * Note on the nesting of these functions: | ||
| 20 | * | ||
| 21 | * ->pin() | ||
| 22 | * ->steal() | ||
| 23 | * ... | ||
| 24 | * ->map() | ||
| 25 | * ... | ||
| 26 | * ->unmap() | ||
| 27 | * | ||
| 28 | * That is, ->map() must be called on a pinned buffer, same goes for ->steal(). | ||
| 29 | */ | ||
| 18 | struct pipe_buf_operations { | 30 | struct pipe_buf_operations { |
| 19 | int can_merge; | 31 | int can_merge; |
| 20 | void * (*map)(struct file *, struct pipe_inode_info *, struct pipe_buffer *); | 32 | void * (*map)(struct pipe_inode_info *, struct pipe_buffer *, int); |
| 21 | void (*unmap)(struct pipe_inode_info *, struct pipe_buffer *); | 33 | void (*unmap)(struct pipe_inode_info *, struct pipe_buffer *, void *); |
| 34 | int (*pin)(struct pipe_inode_info *, struct pipe_buffer *); | ||
| 22 | void (*release)(struct pipe_inode_info *, struct pipe_buffer *); | 35 | void (*release)(struct pipe_inode_info *, struct pipe_buffer *); |
| 23 | int (*steal)(struct pipe_inode_info *, struct pipe_buffer *); | 36 | int (*steal)(struct pipe_inode_info *, struct pipe_buffer *); |
| 24 | void (*get)(struct pipe_inode_info *, struct pipe_buffer *); | 37 | void (*get)(struct pipe_inode_info *, struct pipe_buffer *); |
| @@ -51,6 +64,13 @@ struct pipe_inode_info * alloc_pipe_info(struct inode * inode); | |||
| 51 | void free_pipe_info(struct inode * inode); | 64 | void free_pipe_info(struct inode * inode); |
| 52 | void __free_pipe_info(struct pipe_inode_info *); | 65 | void __free_pipe_info(struct pipe_inode_info *); |
| 53 | 66 | ||
| 67 | /* Generic pipe buffer ops functions */ | ||
| 68 | void *generic_pipe_buf_map(struct pipe_inode_info *, struct pipe_buffer *, int); | ||
| 69 | void generic_pipe_buf_unmap(struct pipe_inode_info *, struct pipe_buffer *, void *); | ||
| 70 | void generic_pipe_buf_get(struct pipe_inode_info *, struct pipe_buffer *); | ||
| 71 | int generic_pipe_buf_pin(struct pipe_inode_info *, struct pipe_buffer *); | ||
| 72 | int generic_pipe_buf_steal(struct pipe_inode_info *, struct pipe_buffer *); | ||
| 73 | |||
| 54 | /* | 74 | /* |
| 55 | * splice is tied to pipes as a transport (at least for now), so we'll just | 75 | * splice is tied to pipes as a transport (at least for now), so we'll just |
| 56 | * add the splice flags here. | 76 | * add the splice flags here. |
| @@ -60,5 +80,23 @@ void __free_pipe_info(struct pipe_inode_info *); | |||
| 60 | /* we may still block on the fd we splice */ | 80 | /* we may still block on the fd we splice */ |
| 61 | /* from/to, of course */ | 81 | /* from/to, of course */ |
| 62 | #define SPLICE_F_MORE (0x04) /* expect more data */ | 82 | #define SPLICE_F_MORE (0x04) /* expect more data */ |
| 83 | #define SPLICE_F_GIFT (0x08) /* pages passed in are a gift */ | ||
| 84 | |||
| 85 | /* | ||
| 86 | * Passed to the actors | ||
| 87 | */ | ||
| 88 | struct splice_desc { | ||
| 89 | unsigned int len, total_len; /* current and remaining length */ | ||
| 90 | unsigned int flags; /* splice flags */ | ||
| 91 | struct file *file; /* file to read/write */ | ||
| 92 | loff_t pos; /* file position */ | ||
| 93 | }; | ||
| 94 | |||
| 95 | typedef int (splice_actor)(struct pipe_inode_info *, struct pipe_buffer *, | ||
| 96 | struct splice_desc *); | ||
| 97 | |||
| 98 | extern ssize_t splice_from_pipe(struct pipe_inode_info *, struct file *, | ||
| 99 | loff_t *, size_t, unsigned int, | ||
| 100 | splice_actor *); | ||
| 63 | 101 | ||
| 64 | #endif | 102 | #endif |
diff --git a/include/linux/sched.h b/include/linux/sched.h index b7d31e2e1729..29b7d4f87d20 100644 --- a/include/linux/sched.h +++ b/include/linux/sched.h | |||
| @@ -1192,8 +1192,7 @@ extern void wait_task_inactive(task_t * p); | |||
| 1192 | #define remove_parent(p) list_del_init(&(p)->sibling) | 1192 | #define remove_parent(p) list_del_init(&(p)->sibling) |
| 1193 | #define add_parent(p) list_add_tail(&(p)->sibling,&(p)->parent->children) | 1193 | #define add_parent(p) list_add_tail(&(p)->sibling,&(p)->parent->children) |
| 1194 | 1194 | ||
| 1195 | #define next_task(p) list_entry((p)->tasks.next, struct task_struct, tasks) | 1195 | #define next_task(p) list_entry(rcu_dereference((p)->tasks.next), struct task_struct, tasks) |
| 1196 | #define prev_task(p) list_entry((p)->tasks.prev, struct task_struct, tasks) | ||
| 1197 | 1196 | ||
| 1198 | #define for_each_process(p) \ | 1197 | #define for_each_process(p) \ |
| 1199 | for (p = &init_task ; (p = next_task(p)) != &init_task ; ) | 1198 | for (p = &init_task ; (p = next_task(p)) != &init_task ; ) |
diff --git a/include/linux/security.h b/include/linux/security.h index aaa0a5cdbf75..1bab48f6aeac 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
| @@ -869,11 +869,6 @@ struct swap_info_struct; | |||
| 869 | * @ipcp contains the kernel IPC permission structure | 869 | * @ipcp contains the kernel IPC permission structure |
| 870 | * @flag contains the desired (requested) permission set | 870 | * @flag contains the desired (requested) permission set |
| 871 | * Return 0 if permission is granted. | 871 | * Return 0 if permission is granted. |
| 872 | * @ipc_getsecurity: | ||
| 873 | * Copy the security label associated with the ipc object into | ||
| 874 | * @buffer. @buffer may be NULL to request the size of the buffer | ||
| 875 | * required. @size indicates the size of @buffer in bytes. Return | ||
| 876 | * number of bytes used/required on success. | ||
| 877 | * | 872 | * |
| 878 | * Security hooks for individual messages held in System V IPC message queues | 873 | * Security hooks for individual messages held in System V IPC message queues |
| 879 | * @msg_msg_alloc_security: | 874 | * @msg_msg_alloc_security: |
| @@ -1223,7 +1218,6 @@ struct security_operations { | |||
| 1223 | void (*task_to_inode)(struct task_struct *p, struct inode *inode); | 1218 | void (*task_to_inode)(struct task_struct *p, struct inode *inode); |
| 1224 | 1219 | ||
| 1225 | int (*ipc_permission) (struct kern_ipc_perm * ipcp, short flag); | 1220 | int (*ipc_permission) (struct kern_ipc_perm * ipcp, short flag); |
| 1226 | int (*ipc_getsecurity)(struct kern_ipc_perm *ipcp, void *buffer, size_t size); | ||
| 1227 | 1221 | ||
| 1228 | int (*msg_msg_alloc_security) (struct msg_msg * msg); | 1222 | int (*msg_msg_alloc_security) (struct msg_msg * msg); |
| 1229 | void (*msg_msg_free_security) (struct msg_msg * msg); | 1223 | void (*msg_msg_free_security) (struct msg_msg * msg); |
| @@ -1887,11 +1881,6 @@ static inline int security_ipc_permission (struct kern_ipc_perm *ipcp, | |||
| 1887 | return security_ops->ipc_permission (ipcp, flag); | 1881 | return security_ops->ipc_permission (ipcp, flag); |
| 1888 | } | 1882 | } |
| 1889 | 1883 | ||
| 1890 | static inline int security_ipc_getsecurity(struct kern_ipc_perm *ipcp, void *buffer, size_t size) | ||
| 1891 | { | ||
| 1892 | return security_ops->ipc_getsecurity(ipcp, buffer, size); | ||
| 1893 | } | ||
| 1894 | |||
| 1895 | static inline int security_msg_msg_alloc (struct msg_msg * msg) | 1884 | static inline int security_msg_msg_alloc (struct msg_msg * msg) |
| 1896 | { | 1885 | { |
| 1897 | return security_ops->msg_msg_alloc_security (msg); | 1886 | return security_ops->msg_msg_alloc_security (msg); |
| @@ -2532,11 +2521,6 @@ static inline int security_ipc_permission (struct kern_ipc_perm *ipcp, | |||
| 2532 | return 0; | 2521 | return 0; |
| 2533 | } | 2522 | } |
| 2534 | 2523 | ||
| 2535 | static inline int security_ipc_getsecurity(struct kern_ipc_perm *ipcp, void *buffer, size_t size) | ||
| 2536 | { | ||
| 2537 | return -EOPNOTSUPP; | ||
| 2538 | } | ||
| 2539 | |||
| 2540 | static inline int security_msg_msg_alloc (struct msg_msg * msg) | 2524 | static inline int security_msg_msg_alloc (struct msg_msg * msg) |
| 2541 | { | 2525 | { |
| 2542 | return 0; | 2526 | return 0; |
diff --git a/include/linux/selinux.h b/include/linux/selinux.h new file mode 100644 index 000000000000..4047bcde4484 --- /dev/null +++ b/include/linux/selinux.h | |||
| @@ -0,0 +1,177 @@ | |||
| 1 | /* | ||
| 2 | * SELinux services exported to the rest of the kernel. | ||
| 3 | * | ||
| 4 | * Author: James Morris <jmorris@redhat.com> | ||
| 5 | * | ||
| 6 | * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com> | ||
| 7 | * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> | ||
| 8 | * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com> | ||
| 9 | * | ||
| 10 | * This program is free software; you can redistribute it and/or modify | ||
| 11 | * it under the terms of the GNU General Public License version 2, | ||
| 12 | * as published by the Free Software Foundation. | ||
| 13 | */ | ||
| 14 | #ifndef _LINUX_SELINUX_H | ||
| 15 | #define _LINUX_SELINUX_H | ||
| 16 | |||
| 17 | struct selinux_audit_rule; | ||
| 18 | struct audit_context; | ||
| 19 | struct inode; | ||
| 20 | struct kern_ipc_perm; | ||
| 21 | |||
| 22 | #ifdef CONFIG_SECURITY_SELINUX | ||
| 23 | |||
| 24 | /** | ||
| 25 | * selinux_audit_rule_init - alloc/init an selinux audit rule structure. | ||
| 26 | * @field: the field this rule refers to | ||
| 27 | * @op: the operater the rule uses | ||
| 28 | * @rulestr: the text "target" of the rule | ||
| 29 | * @rule: pointer to the new rule structure returned via this | ||
| 30 | * | ||
| 31 | * Returns 0 if successful, -errno if not. On success, the rule structure | ||
| 32 | * will be allocated internally. The caller must free this structure with | ||
| 33 | * selinux_audit_rule_free() after use. | ||
| 34 | */ | ||
| 35 | int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, | ||
| 36 | struct selinux_audit_rule **rule); | ||
| 37 | |||
| 38 | /** | ||
| 39 | * selinux_audit_rule_free - free an selinux audit rule structure. | ||
| 40 | * @rule: pointer to the audit rule to be freed | ||
| 41 | * | ||
| 42 | * This will free all memory associated with the given rule. | ||
| 43 | * If @rule is NULL, no operation is performed. | ||
| 44 | */ | ||
| 45 | void selinux_audit_rule_free(struct selinux_audit_rule *rule); | ||
| 46 | |||
| 47 | /** | ||
| 48 | * selinux_audit_rule_match - determine if a context ID matches a rule. | ||
| 49 | * @ctxid: the context ID to check | ||
| 50 | * @field: the field this rule refers to | ||
| 51 | * @op: the operater the rule uses | ||
| 52 | * @rule: pointer to the audit rule to check against | ||
| 53 | * @actx: the audit context (can be NULL) associated with the check | ||
| 54 | * | ||
| 55 | * Returns 1 if the context id matches the rule, 0 if it does not, and | ||
| 56 | * -errno on failure. | ||
| 57 | */ | ||
| 58 | int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op, | ||
| 59 | struct selinux_audit_rule *rule, | ||
| 60 | struct audit_context *actx); | ||
| 61 | |||
| 62 | /** | ||
| 63 | * selinux_audit_set_callback - set the callback for policy reloads. | ||
| 64 | * @callback: the function to call when the policy is reloaded | ||
| 65 | * | ||
| 66 | * This sets the function callback function that will update the rules | ||
| 67 | * upon policy reloads. This callback should rebuild all existing rules | ||
| 68 | * using selinux_audit_rule_init(). | ||
| 69 | */ | ||
| 70 | void selinux_audit_set_callback(int (*callback)(void)); | ||
| 71 | |||
| 72 | /** | ||
| 73 | * selinux_task_ctxid - determine a context ID for a process. | ||
| 74 | * @tsk: the task object | ||
| 75 | * @ctxid: ID value returned via this | ||
| 76 | * | ||
| 77 | * On return, ctxid will contain an ID for the context. This value | ||
| 78 | * should only be used opaquely. | ||
| 79 | */ | ||
| 80 | void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid); | ||
| 81 | |||
| 82 | /** | ||
| 83 | * selinux_ctxid_to_string - map a security context ID to a string | ||
| 84 | * @ctxid: security context ID to be converted. | ||
| 85 | * @ctx: address of context string to be returned | ||
| 86 | * @ctxlen: length of returned context string. | ||
| 87 | * | ||
| 88 | * Returns 0 if successful, -errno if not. On success, the context | ||
| 89 | * string will be allocated internally, and the caller must call | ||
| 90 | * kfree() on it after use. | ||
| 91 | */ | ||
| 92 | int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen); | ||
| 93 | |||
| 94 | /** | ||
| 95 | * selinux_get_inode_sid - get the inode's security context ID | ||
| 96 | * @inode: inode structure to get the sid from. | ||
| 97 | * @sid: pointer to security context ID to be filled in. | ||
| 98 | * | ||
| 99 | * Returns nothing | ||
| 100 | */ | ||
| 101 | void selinux_get_inode_sid(const struct inode *inode, u32 *sid); | ||
| 102 | |||
| 103 | /** | ||
| 104 | * selinux_get_ipc_sid - get the ipc security context ID | ||
| 105 | * @ipcp: ipc structure to get the sid from. | ||
| 106 | * @sid: pointer to security context ID to be filled in. | ||
| 107 | * | ||
| 108 | * Returns nothing | ||
| 109 | */ | ||
| 110 | void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid); | ||
| 111 | |||
| 112 | /** | ||
| 113 | * selinux_get_task_sid - return the SID of task | ||
| 114 | * @tsk: the task whose SID will be returned | ||
| 115 | * @sid: pointer to security context ID to be filled in. | ||
| 116 | * | ||
| 117 | * Returns nothing | ||
| 118 | */ | ||
| 119 | void selinux_get_task_sid(struct task_struct *tsk, u32 *sid); | ||
| 120 | |||
| 121 | |||
| 122 | #else | ||
| 123 | |||
| 124 | static inline int selinux_audit_rule_init(u32 field, u32 op, | ||
| 125 | char *rulestr, | ||
| 126 | struct selinux_audit_rule **rule) | ||
| 127 | { | ||
| 128 | return -ENOTSUPP; | ||
| 129 | } | ||
| 130 | |||
| 131 | static inline void selinux_audit_rule_free(struct selinux_audit_rule *rule) | ||
| 132 | { | ||
| 133 | return; | ||
| 134 | } | ||
| 135 | |||
| 136 | static inline int selinux_audit_rule_match(u32 ctxid, u32 field, u32 op, | ||
| 137 | struct selinux_audit_rule *rule, | ||
| 138 | struct audit_context *actx) | ||
| 139 | { | ||
| 140 | return 0; | ||
| 141 | } | ||
| 142 | |||
| 143 | static inline void selinux_audit_set_callback(int (*callback)(void)) | ||
| 144 | { | ||
| 145 | return; | ||
| 146 | } | ||
| 147 | |||
| 148 | static inline void selinux_task_ctxid(struct task_struct *tsk, u32 *ctxid) | ||
| 149 | { | ||
| 150 | *ctxid = 0; | ||
| 151 | } | ||
| 152 | |||
| 153 | static inline int selinux_ctxid_to_string(u32 ctxid, char **ctx, u32 *ctxlen) | ||
| 154 | { | ||
| 155 | *ctx = NULL; | ||
| 156 | *ctxlen = 0; | ||
| 157 | return 0; | ||
| 158 | } | ||
| 159 | |||
| 160 | static inline void selinux_get_inode_sid(const struct inode *inode, u32 *sid) | ||
| 161 | { | ||
| 162 | *sid = 0; | ||
| 163 | } | ||
| 164 | |||
| 165 | static inline void selinux_get_ipc_sid(const struct kern_ipc_perm *ipcp, u32 *sid) | ||
| 166 | { | ||
| 167 | *sid = 0; | ||
| 168 | } | ||
| 169 | |||
| 170 | static inline void selinux_get_task_sid(struct task_struct *tsk, u32 *sid) | ||
| 171 | { | ||
| 172 | *sid = 0; | ||
| 173 | } | ||
| 174 | |||
| 175 | #endif /* CONFIG_SECURITY_SELINUX */ | ||
| 176 | |||
| 177 | #endif /* _LINUX_SELINUX_H */ | ||
diff --git a/include/linux/signal.h b/include/linux/signal.h index 162a8fd10b29..70739f51a09f 100644 --- a/include/linux/signal.h +++ b/include/linux/signal.h | |||
| @@ -14,10 +14,12 @@ | |||
| 14 | * | 14 | * |
| 15 | * SA_INTERRUPT is also used by the irq handling routines. | 15 | * SA_INTERRUPT is also used by the irq handling routines. |
| 16 | * SA_SHIRQ is for shared interrupt support on PCI and EISA. | 16 | * SA_SHIRQ is for shared interrupt support on PCI and EISA. |
| 17 | * SA_PROBEIRQ is set by callers when they expect sharing mismatches to occur | ||
| 17 | */ | 18 | */ |
| 18 | #define SA_PROBE SA_ONESHOT | ||
| 19 | #define SA_SAMPLE_RANDOM SA_RESTART | 19 | #define SA_SAMPLE_RANDOM SA_RESTART |
| 20 | #define SA_SHIRQ 0x04000000 | 20 | #define SA_SHIRQ 0x04000000 |
| 21 | #define SA_PROBEIRQ 0x08000000 | ||
| 22 | |||
| 21 | /* | 23 | /* |
| 22 | * As above, these correspond to the IORESOURCE_IRQ_* defines in | 24 | * As above, these correspond to the IORESOURCE_IRQ_* defines in |
| 23 | * linux/ioport.h to select the interrupt line behaviour. When | 25 | * linux/ioport.h to select the interrupt line behaviour. When |
diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h index c4619a428d9b..f8f234708b98 100644 --- a/include/linux/skbuff.h +++ b/include/linux/skbuff.h | |||
| @@ -344,6 +344,13 @@ extern void skb_over_panic(struct sk_buff *skb, int len, | |||
| 344 | void *here); | 344 | void *here); |
| 345 | extern void skb_under_panic(struct sk_buff *skb, int len, | 345 | extern void skb_under_panic(struct sk_buff *skb, int len, |
| 346 | void *here); | 346 | void *here); |
| 347 | extern void skb_truesize_bug(struct sk_buff *skb); | ||
| 348 | |||
| 349 | static inline void skb_truesize_check(struct sk_buff *skb) | ||
| 350 | { | ||
| 351 | if (unlikely((int)skb->truesize < sizeof(struct sk_buff) + skb->len)) | ||
| 352 | skb_truesize_bug(skb); | ||
| 353 | } | ||
| 347 | 354 | ||
| 348 | extern int skb_append_datato_frags(struct sock *sk, struct sk_buff *skb, | 355 | extern int skb_append_datato_frags(struct sock *sk, struct sk_buff *skb, |
| 349 | int getfrag(void *from, char *to, int offset, | 356 | int getfrag(void *from, char *to, int offset, |
diff --git a/include/linux/spi/ads7846.h b/include/linux/spi/ads7846.h index 72261e0f2ac1..adb3dafd33e9 100644 --- a/include/linux/spi/ads7846.h +++ b/include/linux/spi/ads7846.h | |||
| @@ -14,5 +14,12 @@ struct ads7846_platform_data { | |||
| 14 | u16 x_min, x_max; | 14 | u16 x_min, x_max; |
| 15 | u16 y_min, y_max; | 15 | u16 y_min, y_max; |
| 16 | u16 pressure_min, pressure_max; | 16 | u16 pressure_min, pressure_max; |
| 17 | |||
| 18 | u16 debounce_max; /* max number of additional readings | ||
| 19 | * per sample */ | ||
| 20 | u16 debounce_tol; /* tolerance used for filtering */ | ||
| 21 | u16 debounce_rep; /* additional consecutive good readings | ||
| 22 | * required after the first two */ | ||
| 23 | int (*get_pendown_state)(void); | ||
| 17 | }; | 24 | }; |
| 18 | 25 | ||
diff --git a/include/linux/sunrpc/metrics.h b/include/linux/sunrpc/metrics.h index 8f96e9dc369a..77f78e56c481 100644 --- a/include/linux/sunrpc/metrics.h +++ b/include/linux/sunrpc/metrics.h | |||
| @@ -69,9 +69,21 @@ struct rpc_clnt; | |||
| 69 | /* | 69 | /* |
| 70 | * EXPORTed functions for managing rpc_iostats structures | 70 | * EXPORTed functions for managing rpc_iostats structures |
| 71 | */ | 71 | */ |
| 72 | |||
| 73 | #ifdef CONFIG_PROC_FS | ||
| 74 | |||
| 72 | struct rpc_iostats * rpc_alloc_iostats(struct rpc_clnt *); | 75 | struct rpc_iostats * rpc_alloc_iostats(struct rpc_clnt *); |
| 73 | void rpc_count_iostats(struct rpc_task *); | 76 | void rpc_count_iostats(struct rpc_task *); |
| 74 | void rpc_print_iostats(struct seq_file *, struct rpc_clnt *); | 77 | void rpc_print_iostats(struct seq_file *, struct rpc_clnt *); |
| 75 | void rpc_free_iostats(struct rpc_iostats *); | 78 | void rpc_free_iostats(struct rpc_iostats *); |
| 76 | 79 | ||
| 80 | #else /* CONFIG_PROC_FS */ | ||
| 81 | |||
| 82 | static inline struct rpc_iostats *rpc_alloc_iostats(struct rpc_clnt *clnt) { return NULL; } | ||
| 83 | static inline void rpc_count_iostats(struct rpc_task *task) {} | ||
| 84 | static inline void rpc_print_iostats(struct seq_file *seq, struct rpc_clnt *clnt) {} | ||
| 85 | static inline void rpc_free_iostats(struct rpc_iostats *stats) {} | ||
| 86 | |||
| 87 | #endif /* CONFIG_PROC_FS */ | ||
| 88 | |||
| 77 | #endif /* _LINUX_SUNRPC_METRICS_H */ | 89 | #endif /* _LINUX_SUNRPC_METRICS_H */ |
diff --git a/include/linux/sunrpc/xprt.h b/include/linux/sunrpc/xprt.h index 7eebbab7160b..e8bbe8118de8 100644 --- a/include/linux/sunrpc/xprt.h +++ b/include/linux/sunrpc/xprt.h | |||
| @@ -53,6 +53,7 @@ struct rpc_timeout { | |||
| 53 | 53 | ||
| 54 | struct rpc_task; | 54 | struct rpc_task; |
| 55 | struct rpc_xprt; | 55 | struct rpc_xprt; |
| 56 | struct seq_file; | ||
| 56 | 57 | ||
| 57 | /* | 58 | /* |
| 58 | * This describes a complete RPC request | 59 | * This describes a complete RPC request |
diff --git a/include/linux/syscalls.h b/include/linux/syscalls.h index d3ebc0e68b2b..3996960fc565 100644 --- a/include/linux/syscalls.h +++ b/include/linux/syscalls.h | |||
| @@ -574,6 +574,9 @@ asmlinkage long sys_splice(int fd_in, loff_t __user *off_in, | |||
| 574 | int fd_out, loff_t __user *off_out, | 574 | int fd_out, loff_t __user *off_out, |
| 575 | size_t len, unsigned int flags); | 575 | size_t len, unsigned int flags); |
| 576 | 576 | ||
| 577 | asmlinkage long sys_vmsplice(int fd, const struct iovec __user *iov, | ||
| 578 | unsigned long nr_segs, unsigned int flags); | ||
| 579 | |||
| 577 | asmlinkage long sys_tee(int fdin, int fdout, size_t len, unsigned int flags); | 580 | asmlinkage long sys_tee(int fdin, int fdout, size_t len, unsigned int flags); |
| 578 | 581 | ||
| 579 | asmlinkage long sys_sync_file_range(int fd, loff_t offset, loff_t nbytes, | 582 | asmlinkage long sys_sync_file_range(int fd, loff_t offset, loff_t nbytes, |
