mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 02:30:34 +02:00 
			
		
		
		
	lockdep, but it's a mechanical change. Cheers, Rusty. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAABAgAGBQJRJAcuAAoJENkgDmzRrbjxsw0P/3eXb+LddYnx0V0uHYdKpCUf 4vdW7X0fX3Z+aUK69IWRL/6ahoO4TpaHYGHBDjEoivyQ0GDq14X7JNWsYYt3LdMf 3wmDgRc2cn/mZOJbFeVpNV8ox5l/xc0CUvV+iQ8tMjfQItXMXgWUFZKMECsXKSO6 eex3lrw9M2jAX2uL8LQPp9W8xtKu24nSZRC6tH5riE/8fCzi1cZPPAqfxP5c8Lee ZXtbCRSyAFENZLpKyMe1PC7HvtJyi5NDn9xwOQiXULZV/VOlvP94DGBLIKCM/6dn 4QvZxpG0P0uOlpCgRAVLyh/z7g4XY4VF/fHopLCmEcqLsvgD+V2LQpQ9zWUalLPC Z+pUpz2vu0gIddPU1nR8R6oGpEdJ8O12aJle62p/RSXWZGx12qUQ+Tamu0tgKcv1 AsiJfbUGNDYfxgU6sHsoQjl2f68LTVckCU1C1LqEbW/S104EIORtGx30CHM4LRiO 32kDC5TtgYDBKQAIqJ4bL48ZMh+9W3uX40p7xzOI5khHQjvswUKa3jcxupU0C1uv lx8KXo7pn8WT33QGysWC782wJCgJuzSc2vRn+KQoqoynuHGM6agaEtR59gil3QWO rQEcxH63BBRDgHlg4FM9IkJwwsnC3PWKL8gbX0uAWXAPMbgapJkuuGZAwt0WDGVK +GszxsFkCjlW0mK0egTb =tiSY -----END PGP SIGNATURE----- Merge tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/rusty/linux Pull module update from Rusty Russell: "The sweeping change is to make add_taint() explicitly indicate whether to disable lockdep, but it's a mechanical change." * tag 'modules-next-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/rusty/linux: MODSIGN: Add option to not sign modules during modules_install MODSIGN: Add -s <signature> option to sign-file MODSIGN: Specify the hash algorithm on sign-file command line MODSIGN: Simplify Makefile with a Kconfig helper module: clean up load_module a little more. modpost: Ignore ARC specific non-alloc sections module: constify within_module_* taint: add explicit flag to show whether lock dep is still OK. module: printk message when module signature fail taints kernel.
		
			
				
	
	
		
			100 lines
		
	
	
	
		
			2.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			100 lines
		
	
	
	
		
			2.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * custom_method.c - debugfs interface for customizing ACPI control method
 | 
						|
 */
 | 
						|
 | 
						|
#include <linux/init.h>
 | 
						|
#include <linux/module.h>
 | 
						|
#include <linux/kernel.h>
 | 
						|
#include <linux/uaccess.h>
 | 
						|
#include <linux/debugfs.h>
 | 
						|
#include <acpi/acpi_drivers.h>
 | 
						|
 | 
						|
#include "internal.h"
 | 
						|
 | 
						|
#define _COMPONENT		ACPI_SYSTEM_COMPONENT
 | 
						|
ACPI_MODULE_NAME("custom_method");
 | 
						|
MODULE_LICENSE("GPL");
 | 
						|
 | 
						|
static struct dentry *cm_dentry;
 | 
						|
 | 
						|
/* /sys/kernel/debug/acpi/custom_method */
 | 
						|
 | 
						|
static ssize_t cm_write(struct file *file, const char __user * user_buf,
 | 
						|
			size_t count, loff_t *ppos)
 | 
						|
{
 | 
						|
	static char *buf;
 | 
						|
	static u32 max_size;
 | 
						|
	static u32 uncopied_bytes;
 | 
						|
 | 
						|
	struct acpi_table_header table;
 | 
						|
	acpi_status status;
 | 
						|
 | 
						|
	if (!(*ppos)) {
 | 
						|
		/* parse the table header to get the table length */
 | 
						|
		if (count <= sizeof(struct acpi_table_header))
 | 
						|
			return -EINVAL;
 | 
						|
		if (copy_from_user(&table, user_buf,
 | 
						|
				   sizeof(struct acpi_table_header)))
 | 
						|
			return -EFAULT;
 | 
						|
		uncopied_bytes = max_size = table.length;
 | 
						|
		buf = kzalloc(max_size, GFP_KERNEL);
 | 
						|
		if (!buf)
 | 
						|
			return -ENOMEM;
 | 
						|
	}
 | 
						|
 | 
						|
	if (buf == NULL)
 | 
						|
		return -EINVAL;
 | 
						|
 | 
						|
	if ((*ppos > max_size) ||
 | 
						|
	    (*ppos + count > max_size) ||
 | 
						|
	    (*ppos + count < count) ||
 | 
						|
	    (count > uncopied_bytes))
 | 
						|
		return -EINVAL;
 | 
						|
 | 
						|
	if (copy_from_user(buf + (*ppos), user_buf, count)) {
 | 
						|
		kfree(buf);
 | 
						|
		buf = NULL;
 | 
						|
		return -EFAULT;
 | 
						|
	}
 | 
						|
 | 
						|
	uncopied_bytes -= count;
 | 
						|
	*ppos += count;
 | 
						|
 | 
						|
	if (!uncopied_bytes) {
 | 
						|
		status = acpi_install_method(buf);
 | 
						|
		kfree(buf);
 | 
						|
		buf = NULL;
 | 
						|
		if (ACPI_FAILURE(status))
 | 
						|
			return -EINVAL;
 | 
						|
		add_taint(TAINT_OVERRIDDEN_ACPI_TABLE, LOCKDEP_NOW_UNRELIABLE);
 | 
						|
	}
 | 
						|
 | 
						|
	return count;
 | 
						|
}
 | 
						|
 | 
						|
static const struct file_operations cm_fops = {
 | 
						|
	.write = cm_write,
 | 
						|
	.llseek = default_llseek,
 | 
						|
};
 | 
						|
 | 
						|
static int __init acpi_custom_method_init(void)
 | 
						|
{
 | 
						|
	if (acpi_debugfs_dir == NULL)
 | 
						|
		return -ENOENT;
 | 
						|
 | 
						|
	cm_dentry = debugfs_create_file("custom_method", S_IWUSR,
 | 
						|
					acpi_debugfs_dir, NULL, &cm_fops);
 | 
						|
	if (cm_dentry == NULL)
 | 
						|
		return -ENODEV;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static void __exit acpi_custom_method_exit(void)
 | 
						|
{
 | 
						|
	if (cm_dentry)
 | 
						|
		debugfs_remove(cm_dentry);
 | 
						|
 }
 | 
						|
 | 
						|
module_init(acpi_custom_method_init);
 | 
						|
module_exit(acpi_custom_method_exit);
 |