/* * AppArmor security module * * This file contains AppArmor security identifier (sid) definitions * * Copyright 2009-2010 Canonical Ltd. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License as * published by the Free Software Foundation, version 2 of the * License. */ #ifndef __AA_SID_H #define __AA_SID_H #include /* sid value that will not be allocated */ #define AA_SID_INVALID 0 #define AA_SID_ALLOC AA_SID_INVALID u32 aa_alloc_sid(void); void aa_free_sid(u32 sid); #endif /* __AA_SID_H */ id='cgit'>
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDaniel Vetter <daniel.vetter@ffwll.ch>2016-06-08 14:18:57 +0200
committerDaniel Vetter <daniel.vetter@ffwll.ch>2016-06-09 10:28:14 +0200
commit30bb70ee731fbdcda405a01bf55e983f9a54e891 (patch)
tree5e6d9b73b31813214a655ce991b129fc10ef03c4
parent9433bd67ddd3a5a3b019f3221cd525c748559cb3 (diff)
drm/hisilicon: Implement some semblance of vblank event handling
atomic_flush seems to be the right place, but I'm not entirely sure whether this will catch them all. It could be that when disabling the crtc we'll miss the vblank. While at it nuke the dummy functions. v2: Be more robust and either arm, when the CRTC is on, or just send the event out right away. Cc: Xinliang Liu <xinliang.liu@linaro.org> Cc: Xinwei Kong <kong.kongxinwei@hisilicon.com> Cc: Archit Taneja <architt@codeaurora.org> Reviewed-by: Maarten Lankhorst <maarten.lankhorst@linux.intel.com> Signed-off-by: Daniel Vetter <daniel.vetter@intel.com> Link: http://patchwork.freedesktop.org/patch/msgid/1465388359-8070-5-git-send-email-daniel.vetter@ffwll.ch