#!/bin/bash # Translate the bits making up a GFP mask # (c) 2009, Mel Gorman # Licensed under the terms of the GNU GPL License version 2 SOURCE= GFPMASK=none # Helper function to report failures and exit die() { echo ERROR: $@ if [ "$TMPFILE" != "" ]; then rm -f $TMPFILE fi exit -1 } usage() { echo "usage: gfp-translate [-h] [ --source DIRECTORY ] gfpmask" exit 0 } # Parse command-line arguments while [ $# -gt 0 ]; do case $1 in --source) SOURCE=$2 shift 2 ;; -h) usage ;; --help) usage ;; *) GFPMASK=$1 shift ;; esac done # Guess the kernel source directory if it's not set. Preference is in order of # o current directory # o /usr/src/linux if [ "$SOURCE" = "" ]; then if [ -r "/usr/src/linux/Makefile" ]; then SOURCE=/usr/src/linux fi if [ -r "`pwd`/Makefile" ]; then SOURCE=`pwd` fi fi # Confirm that a source directory exists if [ ! -r "$SOURCE/Makefile" ]; then die "Could not locate kernel source directory or it is invalid" fi # Confirm that a GFP mask has been specified if [ "$GFPMASK" = "none" ]; then usage fi # Extract GFP flags from the kernel source TMPFILE=`mktemp -t gfptranslate-XXXXXX` || exit 1 grep -q ___GFP $SOURCE/include/linux/gfp.h if [ $? -eq 0 ]; then grep "^#define ___GFP" $SOURCE/include/linux/gfp.h | sed -e 's/u$//' | grep -v GFP_BITS > $TMPFILE else grep "^#define __GFP" $SOURCE/include/linux/gfp.h | sed -e 's/(__force gfp_t)//' | sed -e 's/u)/)/' | grep -v GFP_BITS | sed -e 's/)\//) \//' > $TMPFILE fi # Parse the flags IFS=" " echo Source: $SOURCE echo Parsing: $GFPMASK for LINE in `cat $TMPFILE`; do MASK=`echo $LINE | awk '{print $3}'` if [ $(($GFPMASK&$MASK)) -ne 0 ]; then echo $LINE fi done rm -f $TMPFILE exit 0 /include/dt-bindings/sound'>logtreecommitdiff
path: root/include/dt-bindings/sound
diff options
context:
space:
mode:
authorWillem de Bruijn <willemb@google.com>2017-01-02 17:19:40 -0500
committerPablo Neira Ayuso <pablo@netfilter.org>2017-01-09 17:24:53 +0100
commitf32815d21d4d8287336fb9cef4d2d9e0866214c2 (patch)
treeeedb12ee6e68b344d1ffb5df9615981394e8d07b /include/dt-bindings/sound
parent4cc4b72c136a45aeccd86f66b0859b148b47d881 (diff)
xtables: add xt_match, xt_target and data copy_to_user functions
xt_entry_target, xt_entry_match and their private data may contain kernel data. Introduce helper functions xt_match_to_user, xt_target_to_user and xt_data_to_user that copy only the expected fields. These replace existing logic that calls copy_to_user on entire structs, then overwrites select fields. Private data is defined in xt_match and xt_target. All matches and targets that maintain kernel data store this at the tail of their private structure. Extend xt_match and xt_target with .usersize to limit how many bytes of data are copied. The remainder is cleared. If compatsize is specified, usersize can only safely be used if all fields up to usersize use platform-independent types. Otherwise, the compat_to_user callback must be defined. This patch does not yet enable the support logic. Signed-off-by: Willem de Bruijn <willemb@google.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'include/dt-bindings/sound')