diff options
| author | Arnd Bergmann <arnd@arndb.de> | 2013-04-08 12:26:15 -0400 |
|---|---|---|
| committer | Arnd Bergmann <arnd@arndb.de> | 2013-04-08 12:26:15 -0400 |
| commit | e9069cf8b74b50d804fd540a9fd1383504f4af93 (patch) | |
| tree | 0b3a30308ffc00a73f681bfdf19214b5ba9ae5a6 /security | |
| parent | 4680ebc2c90f663ba70c6bb3d8596b0f2c4dfa9e (diff) | |
| parent | ce63d6d4bb9f601de32d4b99f925a65182521873 (diff) | |
Merge tag 'vt8500/pinctrl' of git://server.prisktech.co.nz/git/linuxwmt into next/drivers
From Tony Prisk <linux@prisktech.co.nz>:
arm: vt8500: Add pinctrl driver for arch-vt8500
This series adds support for the pinctrl/gpio module on all arch-vt8500
supported SoCs.
As part of the review process, some tidy up is also done to
drivers/of/base.c to remove some code that is being constantly duplicated.
Also, a patch for the bcm2835 pinctrl driver is included to take advantage
of the new of/base.c code.
* tag 'vt8500/pinctrl' of git://server.prisktech.co.nz/git/linuxwmt: (606 commits)
pinctrl: bcm2835: make use of of_property_read_u32_index()
gpio: vt8500: Remove arch-vt8500 gpio driver
arm: vt8500: Remove gpio devicetree nodes
arm: dts: vt8500: Update Wondermedia SoC dtsi files for pinctrl driver
pinctrl: gpio: vt8500: Add pincontrol driver for arch-vt8500
arm: vt8500: Increase available GPIOs on arch-vt8500
of: Remove duplicated code for validating property and value
of: Add support for reading a u32 from a multi-value property.
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Diffstat (limited to 'security')
| -rw-r--r-- | security/keys/compat.c | 4 | ||||
| -rw-r--r-- | security/keys/process_keys.c | 2 | ||||
| -rw-r--r-- | security/selinux/xfrm.c | 2 |
3 files changed, 4 insertions, 4 deletions
diff --git a/security/keys/compat.c b/security/keys/compat.c index 1c261763f479..d65fa7fa29ba 100644 --- a/security/keys/compat.c +++ b/security/keys/compat.c | |||
| @@ -40,12 +40,12 @@ static long compat_keyctl_instantiate_key_iov( | |||
| 40 | ARRAY_SIZE(iovstack), | 40 | ARRAY_SIZE(iovstack), |
| 41 | iovstack, &iov); | 41 | iovstack, &iov); |
| 42 | if (ret < 0) | 42 | if (ret < 0) |
| 43 | return ret; | 43 | goto err; |
| 44 | if (ret == 0) | 44 | if (ret == 0) |
| 45 | goto no_payload_free; | 45 | goto no_payload_free; |
| 46 | 46 | ||
| 47 | ret = keyctl_instantiate_key_common(id, iov, ioc, ret, ringid); | 47 | ret = keyctl_instantiate_key_common(id, iov, ioc, ret, ringid); |
| 48 | 48 | err: | |
| 49 | if (iov != iovstack) | 49 | if (iov != iovstack) |
| 50 | kfree(iov); | 50 | kfree(iov); |
| 51 | return ret; | 51 | return ret; |
diff --git a/security/keys/process_keys.c b/security/keys/process_keys.c index a571fad91010..42defae1e161 100644 --- a/security/keys/process_keys.c +++ b/security/keys/process_keys.c | |||
| @@ -57,7 +57,7 @@ int install_user_keyrings(void) | |||
| 57 | 57 | ||
| 58 | kenter("%p{%u}", user, uid); | 58 | kenter("%p{%u}", user, uid); |
| 59 | 59 | ||
| 60 | if (user->uid_keyring) { | 60 | if (user->uid_keyring && user->session_keyring) { |
| 61 | kleave(" = 0 [exist]"); | 61 | kleave(" = 0 [exist]"); |
| 62 | return 0; | 62 | return 0; |
| 63 | } | 63 | } |
diff --git a/security/selinux/xfrm.c b/security/selinux/xfrm.c index 48665ecd1197..8ab295154517 100644 --- a/security/selinux/xfrm.c +++ b/security/selinux/xfrm.c | |||
| @@ -310,7 +310,7 @@ int selinux_xfrm_policy_clone(struct xfrm_sec_ctx *old_ctx, | |||
| 310 | 310 | ||
| 311 | if (old_ctx) { | 311 | if (old_ctx) { |
| 312 | new_ctx = kmalloc(sizeof(*old_ctx) + old_ctx->ctx_len, | 312 | new_ctx = kmalloc(sizeof(*old_ctx) + old_ctx->ctx_len, |
| 313 | GFP_KERNEL); | 313 | GFP_ATOMIC); |
| 314 | if (!new_ctx) | 314 | if (!new_ctx) |
| 315 | return -ENOMEM; | 315 | return -ENOMEM; |
| 316 | 316 | ||
