Home
last modified time | relevance | path

Searched hist:"32927393 dc1ccd60fb2bdc05b9e8e88753761469" (Results 1 – 25 of 85) sorted by relevance

1234

/openbmc/linux/security/
H A Dmin_addr.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/arch/x86/kernel/
H A Ditmt.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/include/linux/
H A Dlatencytop.hdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
H A Dnmi.hdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/drivers/macintosh/
H A Dmac_hid.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/net/phonet/
H A Dsysctl.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/ipc/
H A Dmq_sysctl.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
H A Dipc_sysctl.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/fs/xfs/
H A Dxfs_sysctl.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/drivers/parport/
H A Dprocfs.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/fs/fscache/
H A Dmain.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/net/sunrpc/xprtrdma/
H A Dsvc_rdma.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/kernel/
H A Dutsname_sysctl.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
H A Dlatencytop.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
H A Dumh.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/net/sunrpc/
H A Dsysctl.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/fs/
H A Ddrop_caches.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/include/linux/sched/
H A Dsysctl.hdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/arch/s390/mm/
H A Dcmm.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/security/yama/
H A Dyama_lsm.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/kernel/events/
H A Dcallchain.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/arch/arm64/kernel/
H A Darmv8_deprecated.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/arch/s390/appldata/
H A Dappldata_base.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/arch/s390/kernel/
H A Ddebug.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
/openbmc/linux/net/rds/
H A Dtcp.cdiff 32927393dc1ccd60fb2bdc05b9e8e88753761469 Fri Apr 24 01:43:38 CDT 2020 Christoph Hellwig <hch@lst.de> sysctl: pass kernel pointers to ->proc_handler

Instead of having all the sysctl handlers deal with user pointers, which
is rather hairy in terms of the BPF interaction, copy the input to and
from userspace in common code. This also means that the strings are
always NUL-terminated by the common code, making the API a little bit
safer.

As most handler just pass through the data to one of the common handlers
a lot of the changes are mechnical.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>

1234