diff options
| -rw-r--r-- | drivers/ide/pci/alim15x3.c | 10 | ||||
| -rw-r--r-- | drivers/ide/pci/siimage.c | 9 | ||||
| -rw-r--r-- | fs/hfsplus/super.c | 2 | ||||
| -rw-r--r-- | include/linux/capability.h | 12 | ||||
| -rw-r--r-- | include/linux/security.h | 6 | ||||
| -rw-r--r-- | security/dummy.c | 2 | ||||
| -rw-r--r-- | security/security.c | 2 | ||||
| -rw-r--r-- | security/selinux/hooks.c | 2 | ||||
| -rw-r--r-- | security/selinux/include/security.h | 2 | ||||
| -rw-r--r-- | security/selinux/ss/services.c | 4 | ||||
| -rw-r--r-- | security/smack/smack_lsm.c | 2 |
11 files changed, 30 insertions, 23 deletions
diff --git a/drivers/ide/pci/alim15x3.c b/drivers/ide/pci/alim15x3.c index b36a22b8c213..c1922f9cfe80 100644 --- a/drivers/ide/pci/alim15x3.c +++ b/drivers/ide/pci/alim15x3.c | |||
| @@ -412,14 +412,14 @@ static u8 __devinit ali_cable_detect(ide_hwif_t *hwif) | |||
| 412 | return cbl; | 412 | return cbl; |
| 413 | } | 413 | } |
| 414 | 414 | ||
| 415 | #ifndef CONFIG_SPARC64 | 415 | #if !defined(CONFIG_SPARC64) && !defined(CONFIG_PPC) |
| 416 | /** | 416 | /** |
| 417 | * init_hwif_ali15x3 - Initialize the ALI IDE x86 stuff | 417 | * init_hwif_ali15x3 - Initialize the ALI IDE x86 stuff |
| 418 | * @hwif: interface to configure | 418 | * @hwif: interface to configure |
| 419 | * | 419 | * |
| 420 | * Obtain the IRQ tables for an ALi based IDE solution on the PC | 420 | * Obtain the IRQ tables for an ALi based IDE solution on the PC |
| 421 | * class platforms. This part of the code isn't applicable to the | 421 | * class platforms. This part of the code isn't applicable to the |
| 422 | * Sparc systems | 422 | * Sparc and PowerPC systems. |
| 423 | */ | 423 | */ |
| 424 | 424 | ||
| 425 | static void __devinit init_hwif_ali15x3 (ide_hwif_t *hwif) | 425 | static void __devinit init_hwif_ali15x3 (ide_hwif_t *hwif) |
| @@ -463,7 +463,9 @@ static void __devinit init_hwif_ali15x3 (ide_hwif_t *hwif) | |||
| 463 | hwif->irq = irq; | 463 | hwif->irq = irq; |
| 464 | } | 464 | } |
| 465 | } | 465 | } |
| 466 | #endif | 466 | #else |
| 467 | #define init_hwif_ali15x3 NULL | ||
| 468 | #endif /* !defined(CONFIG_SPARC64) && !defined(CONFIG_PPC) */ | ||
| 467 | 469 | ||
| 468 | /** | 470 | /** |
| 469 | * init_dma_ali15x3 - set up DMA on ALi15x3 | 471 | * init_dma_ali15x3 - set up DMA on ALi15x3 |
| @@ -517,9 +519,7 @@ static const struct ide_dma_ops ali_dma_ops = { | |||
| 517 | static const struct ide_port_info ali15x3_chipset __devinitdata = { | 519 | static const struct ide_port_info ali15x3_chipset __devinitdata = { |
| 518 | .name = "ALI15X3", | 520 | .name = "ALI15X3", |
| 519 | .init_chipset = init_chipset_ali15x3, | 521 | .init_chipset = init_chipset_ali15x3, |
| 520 | #ifndef CONFIG_SPARC64 | ||
| 521 | .init_hwif = init_hwif_ali15x3, | 522 | .init_hwif = init_hwif_ali15x3, |
| 522 | #endif | ||
| 523 | .init_dma = init_dma_ali15x3, | 523 | .init_dma = init_dma_ali15x3, |
| 524 | .port_ops = &ali_port_ops, | 524 | .port_ops = &ali_port_ops, |
| 525 | .pio_mask = ATA_PIO5, | 525 | .pio_mask = ATA_PIO5, |
diff --git a/drivers/ide/pci/siimage.c b/drivers/ide/pci/siimage.c index 4cf8fc54aa2a..0006b9e58567 100644 --- a/drivers/ide/pci/siimage.c +++ b/drivers/ide/pci/siimage.c | |||
| @@ -737,8 +737,15 @@ static const struct ide_port_ops sil_sata_port_ops = { | |||
| 737 | .cable_detect = sil_cable_detect, | 737 | .cable_detect = sil_cable_detect, |
| 738 | }; | 738 | }; |
| 739 | 739 | ||
| 740 | static struct ide_dma_ops sil_dma_ops = { | 740 | static const struct ide_dma_ops sil_dma_ops = { |
| 741 | .dma_host_set = ide_dma_host_set, | ||
| 742 | .dma_setup = ide_dma_setup, | ||
| 743 | .dma_exec_cmd = ide_dma_exec_cmd, | ||
| 744 | .dma_start = ide_dma_start, | ||
| 745 | .dma_end = __ide_dma_end, | ||
| 741 | .dma_test_irq = siimage_dma_test_irq, | 746 | .dma_test_irq = siimage_dma_test_irq, |
| 747 | .dma_timeout = ide_dma_timeout, | ||
| 748 | .dma_lost_irq = ide_dma_lost_irq, | ||
| 742 | }; | 749 | }; |
| 743 | 750 | ||
| 744 | #define DECLARE_SII_DEV(name_str, p_ops) \ | 751 | #define DECLARE_SII_DEV(name_str, p_ops) \ |
diff --git a/fs/hfsplus/super.c b/fs/hfsplus/super.c index b0f9ad362d1d..946466cd9f25 100644 --- a/fs/hfsplus/super.c +++ b/fs/hfsplus/super.c | |||
| @@ -357,7 +357,7 @@ static int hfsplus_fill_super(struct super_block *sb, void *data, int silent) | |||
| 357 | printk(KERN_WARNING "hfs: Filesystem is marked locked, mounting read-only.\n"); | 357 | printk(KERN_WARNING "hfs: Filesystem is marked locked, mounting read-only.\n"); |
| 358 | sb->s_flags |= MS_RDONLY; | 358 | sb->s_flags |= MS_RDONLY; |
| 359 | } else if (vhdr->attributes & cpu_to_be32(HFSPLUS_VOL_JOURNALED)) { | 359 | } else if (vhdr->attributes & cpu_to_be32(HFSPLUS_VOL_JOURNALED)) { |
| 360 | printk(KERN_WARNING "hfs: write access to a jounaled filesystem is not supported, " | 360 | printk(KERN_WARNING "hfs: write access to a journaled filesystem is not supported, " |
| 361 | "use the force option at your own risk, mounting read-only.\n"); | 361 | "use the force option at your own risk, mounting read-only.\n"); |
| 362 | sb->s_flags |= MS_RDONLY; | 362 | sb->s_flags |= MS_RDONLY; |
| 363 | } | 363 | } |
diff --git a/include/linux/capability.h b/include/linux/capability.h index eaab759b1460..f4ea0dd9a618 100644 --- a/include/linux/capability.h +++ b/include/linux/capability.h | |||
| @@ -365,12 +365,12 @@ typedef struct kernel_cap_struct { | |||
| 365 | # error Fix up hand-coded capability macro initializers | 365 | # error Fix up hand-coded capability macro initializers |
| 366 | #else /* HAND-CODED capability initializers */ | 366 | #else /* HAND-CODED capability initializers */ |
| 367 | 367 | ||
| 368 | # define CAP_EMPTY_SET {{ 0, 0 }} | 368 | # define CAP_EMPTY_SET ((kernel_cap_t){{ 0, 0 }}) |
| 369 | # define CAP_FULL_SET {{ ~0, ~0 }} | 369 | # define CAP_FULL_SET ((kernel_cap_t){{ ~0, ~0 }}) |
| 370 | # define CAP_INIT_EFF_SET {{ ~CAP_TO_MASK(CAP_SETPCAP), ~0 }} | 370 | # define CAP_INIT_EFF_SET ((kernel_cap_t){{ ~CAP_TO_MASK(CAP_SETPCAP), ~0 }}) |
| 371 | # define CAP_FS_SET {{ CAP_FS_MASK_B0, CAP_FS_MASK_B1 } } | 371 | # define CAP_FS_SET ((kernel_cap_t){{ CAP_FS_MASK_B0, CAP_FS_MASK_B1 } }) |
| 372 | # define CAP_NFSD_SET {{ CAP_FS_MASK_B0|CAP_TO_MASK(CAP_SYS_RESOURCE), \ | 372 | # define CAP_NFSD_SET ((kernel_cap_t){{ CAP_FS_MASK_B0|CAP_TO_MASK(CAP_SYS_RESOURCE), \ |
| 373 | CAP_FS_MASK_B1 } } | 373 | CAP_FS_MASK_B1 } }) |
| 374 | 374 | ||
| 375 | #endif /* _LINUX_CAPABILITY_U32S != 2 */ | 375 | #endif /* _LINUX_CAPABILITY_U32S != 2 */ |
| 376 | 376 | ||
diff --git a/include/linux/security.h b/include/linux/security.h index adb09d893ae0..50737c70e78e 100644 --- a/include/linux/security.h +++ b/include/linux/security.h | |||
| @@ -1481,7 +1481,7 @@ struct security_operations { | |||
| 1481 | int (*getprocattr) (struct task_struct *p, char *name, char **value); | 1481 | int (*getprocattr) (struct task_struct *p, char *name, char **value); |
| 1482 | int (*setprocattr) (struct task_struct *p, char *name, void *value, size_t size); | 1482 | int (*setprocattr) (struct task_struct *p, char *name, void *value, size_t size); |
| 1483 | int (*secid_to_secctx) (u32 secid, char **secdata, u32 *seclen); | 1483 | int (*secid_to_secctx) (u32 secid, char **secdata, u32 *seclen); |
| 1484 | int (*secctx_to_secid) (char *secdata, u32 seclen, u32 *secid); | 1484 | int (*secctx_to_secid) (const char *secdata, u32 seclen, u32 *secid); |
| 1485 | void (*release_secctx) (char *secdata, u32 seclen); | 1485 | void (*release_secctx) (char *secdata, u32 seclen); |
| 1486 | 1486 | ||
| 1487 | #ifdef CONFIG_SECURITY_NETWORK | 1487 | #ifdef CONFIG_SECURITY_NETWORK |
| @@ -1730,7 +1730,7 @@ int security_setprocattr(struct task_struct *p, char *name, void *value, size_t | |||
| 1730 | int security_netlink_send(struct sock *sk, struct sk_buff *skb); | 1730 | int security_netlink_send(struct sock *sk, struct sk_buff *skb); |
| 1731 | int security_netlink_recv(struct sk_buff *skb, int cap); | 1731 | int security_netlink_recv(struct sk_buff *skb, int cap); |
| 1732 | int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); | 1732 | int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen); |
| 1733 | int security_secctx_to_secid(char *secdata, u32 seclen, u32 *secid); | 1733 | int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid); |
| 1734 | void security_release_secctx(char *secdata, u32 seclen); | 1734 | void security_release_secctx(char *secdata, u32 seclen); |
| 1735 | 1735 | ||
| 1736 | #else /* CONFIG_SECURITY */ | 1736 | #else /* CONFIG_SECURITY */ |
| @@ -2449,7 +2449,7 @@ static inline int security_secid_to_secctx(u32 secid, char **secdata, u32 *secle | |||
| 2449 | return -EOPNOTSUPP; | 2449 | return -EOPNOTSUPP; |
| 2450 | } | 2450 | } |
| 2451 | 2451 | ||
| 2452 | static inline int security_secctx_to_secid(char *secdata, | 2452 | static inline int security_secctx_to_secid(const char *secdata, |
| 2453 | u32 seclen, | 2453 | u32 seclen, |
| 2454 | u32 *secid) | 2454 | u32 *secid) |
| 2455 | { | 2455 | { |
diff --git a/security/dummy.c b/security/dummy.c index 48cf30226e16..f50c6c3c32c9 100644 --- a/security/dummy.c +++ b/security/dummy.c | |||
| @@ -968,7 +968,7 @@ static int dummy_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) | |||
| 968 | return -EOPNOTSUPP; | 968 | return -EOPNOTSUPP; |
| 969 | } | 969 | } |
| 970 | 970 | ||
| 971 | static int dummy_secctx_to_secid(char *secdata, u32 seclen, u32 *secid) | 971 | static int dummy_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) |
| 972 | { | 972 | { |
| 973 | return -EOPNOTSUPP; | 973 | return -EOPNOTSUPP; |
| 974 | } | 974 | } |
diff --git a/security/security.c b/security/security.c index 8e64a29dc55d..59838a99b80e 100644 --- a/security/security.c +++ b/security/security.c | |||
| @@ -886,7 +886,7 @@ int security_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) | |||
| 886 | } | 886 | } |
| 887 | EXPORT_SYMBOL(security_secid_to_secctx); | 887 | EXPORT_SYMBOL(security_secid_to_secctx); |
| 888 | 888 | ||
| 889 | int security_secctx_to_secid(char *secdata, u32 seclen, u32 *secid) | 889 | int security_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) |
| 890 | { | 890 | { |
| 891 | return security_ops->secctx_to_secid(secdata, seclen, secid); | 891 | return security_ops->secctx_to_secid(secdata, seclen, secid); |
| 892 | } | 892 | } |
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 4e4de98941ae..85a220465a8f 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
| @@ -5238,7 +5238,7 @@ static int selinux_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) | |||
| 5238 | return security_sid_to_context(secid, secdata, seclen); | 5238 | return security_sid_to_context(secid, secdata, seclen); |
| 5239 | } | 5239 | } |
| 5240 | 5240 | ||
| 5241 | static int selinux_secctx_to_secid(char *secdata, u32 seclen, u32 *secid) | 5241 | static int selinux_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) |
| 5242 | { | 5242 | { |
| 5243 | return security_context_to_sid(secdata, seclen, secid); | 5243 | return security_context_to_sid(secdata, seclen, secid); |
| 5244 | } | 5244 | } |
diff --git a/security/selinux/include/security.h b/security/selinux/include/security.h index cdb14add27d2..ad30ac4273d6 100644 --- a/security/selinux/include/security.h +++ b/security/selinux/include/security.h | |||
| @@ -96,7 +96,7 @@ int security_sid_to_context(u32 sid, char **scontext, | |||
| 96 | int security_context_to_sid(const char *scontext, u32 scontext_len, | 96 | int security_context_to_sid(const char *scontext, u32 scontext_len, |
| 97 | u32 *out_sid); | 97 | u32 *out_sid); |
| 98 | 98 | ||
| 99 | int security_context_to_sid_default(char *scontext, u32 scontext_len, | 99 | int security_context_to_sid_default(const char *scontext, u32 scontext_len, |
| 100 | u32 *out_sid, u32 def_sid, gfp_t gfp_flags); | 100 | u32 *out_sid, u32 def_sid, gfp_t gfp_flags); |
| 101 | 101 | ||
| 102 | int security_get_user_sids(u32 callsid, char *username, | 102 | int security_get_user_sids(u32 callsid, char *username, |
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 25cac5a2aa8e..dcc2e1c4fd83 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c | |||
| @@ -858,8 +858,8 @@ int security_context_to_sid(const char *scontext, u32 scontext_len, u32 *sid) | |||
| 858 | * Returns -%EINVAL if the context is invalid, -%ENOMEM if insufficient | 858 | * Returns -%EINVAL if the context is invalid, -%ENOMEM if insufficient |
| 859 | * memory is available, or 0 on success. | 859 | * memory is available, or 0 on success. |
| 860 | */ | 860 | */ |
| 861 | int security_context_to_sid_default(char *scontext, u32 scontext_len, u32 *sid, | 861 | int security_context_to_sid_default(const char *scontext, u32 scontext_len, |
| 862 | u32 def_sid, gfp_t gfp_flags) | 862 | u32 *sid, u32 def_sid, gfp_t gfp_flags) |
| 863 | { | 863 | { |
| 864 | return security_context_to_sid_core(scontext, scontext_len, | 864 | return security_context_to_sid_core(scontext, scontext_len, |
| 865 | sid, def_sid, gfp_flags); | 865 | sid, def_sid, gfp_flags); |
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 5d2ec5650e61..92baee53a7dc 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c | |||
| @@ -2406,7 +2406,7 @@ static int smack_secid_to_secctx(u32 secid, char **secdata, u32 *seclen) | |||
| 2406 | * | 2406 | * |
| 2407 | * Exists for audit and networking code. | 2407 | * Exists for audit and networking code. |
| 2408 | */ | 2408 | */ |
| 2409 | static int smack_secctx_to_secid(char *secdata, u32 seclen, u32 *secid) | 2409 | static int smack_secctx_to_secid(const char *secdata, u32 seclen, u32 *secid) |
| 2410 | { | 2410 | { |
| 2411 | *secid = smack_to_secid(secdata); | 2411 | *secid = smack_to_secid(secdata); |
| 2412 | return 0; | 2412 | return 0; |
