mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/
synced 2025-04-19 20:58:31 +09:00

Add the const qualifier to all the ctl_tables in the tree except for watchdog_hardlockup_sysctl, memory_allocation_profiling_sysctls, loadpin_sysctl_table and the ones calling register_net_sysctl (./net, drivers/inifiniband dirs). These are special cases as they use a registration function with a non-const qualified ctl_table argument or modify the arrays before passing them on to the registration function. Constifying ctl_table structs will prevent the modification of proc_handler function pointers as the arrays would reside in .rodata. This is made possible after commit 78eb4ea25cd5 ("sysctl: treewide: constify the ctl_table argument of proc_handlers") constified all the proc_handlers. Created this by running an spatch followed by a sed command: Spatch: virtual patch @ depends on !(file in "net") disable optional_qualifier @ identifier table_name != { watchdog_hardlockup_sysctl, iwcm_ctl_table, ucma_ctl_table, memory_allocation_profiling_sysctls, loadpin_sysctl_table }; @@ + const struct ctl_table table_name [] = { ... }; sed: sed --in-place \ -e "s/struct ctl_table .table = &uts_kern/const struct ctl_table *table = \&uts_kern/" \ kernel/utsname_sysctl.c Reviewed-by: Song Liu <song@kernel.org> Acked-by: Steven Rostedt (Google) <rostedt@goodmis.org> # for kernel/trace/ Reviewed-by: Martin K. Petersen <martin.petersen@oracle.com> # SCSI Reviewed-by: Darrick J. Wong <djwong@kernel.org> # xfs Acked-by: Jani Nikula <jani.nikula@intel.com> Acked-by: Corey Minyard <cminyard@mvista.com> Acked-by: Wei Liu <wei.liu@kernel.org> Acked-by: Thomas Gleixner <tglx@linutronix.de> Reviewed-by: Bill O'Donnell <bodonnel@redhat.com> Acked-by: Baoquan He <bhe@redhat.com> Acked-by: Ashutosh Dixit <ashutosh.dixit@intel.com> Acked-by: Anna Schumaker <anna.schumaker@oracle.com> Signed-off-by: Joel Granados <joel.granados@kernel.org>
93 lines
2.3 KiB
C
93 lines
2.3 KiB
C
// SPDX-License-Identifier: MIT
|
|
/*
|
|
* Copyright © 2023-2024 Intel Corporation
|
|
*/
|
|
|
|
#include <linux/errno.h>
|
|
#include <linux/sysctl.h>
|
|
|
|
#include <uapi/drm/xe_drm.h>
|
|
|
|
#include "xe_oa.h"
|
|
#include "xe_observation.h"
|
|
|
|
u32 xe_observation_paranoid = true;
|
|
static struct ctl_table_header *sysctl_header;
|
|
|
|
static int xe_oa_ioctl(struct drm_device *dev, struct drm_xe_observation_param *arg,
|
|
struct drm_file *file)
|
|
{
|
|
switch (arg->observation_op) {
|
|
case DRM_XE_OBSERVATION_OP_STREAM_OPEN:
|
|
return xe_oa_stream_open_ioctl(dev, arg->param, file);
|
|
case DRM_XE_OBSERVATION_OP_ADD_CONFIG:
|
|
return xe_oa_add_config_ioctl(dev, arg->param, file);
|
|
case DRM_XE_OBSERVATION_OP_REMOVE_CONFIG:
|
|
return xe_oa_remove_config_ioctl(dev, arg->param, file);
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* xe_observation_ioctl - The top level observation layer ioctl
|
|
* @dev: @drm_device
|
|
* @data: pointer to struct @drm_xe_observation_param
|
|
* @file: @drm_file
|
|
*
|
|
* The function is called for different observation streams types and
|
|
* allows execution of different operations supported by those stream
|
|
* types.
|
|
*
|
|
* Return: 0 on success or a negative error code on failure.
|
|
*/
|
|
int xe_observation_ioctl(struct drm_device *dev, void *data, struct drm_file *file)
|
|
{
|
|
struct drm_xe_observation_param *arg = data;
|
|
|
|
if (arg->extensions)
|
|
return -EINVAL;
|
|
|
|
switch (arg->observation_type) {
|
|
case DRM_XE_OBSERVATION_TYPE_OA:
|
|
return xe_oa_ioctl(dev, arg, file);
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
|
|
static const struct ctl_table observation_ctl_table[] = {
|
|
{
|
|
.procname = "observation_paranoid",
|
|
.data = &xe_observation_paranoid,
|
|
.maxlen = sizeof(xe_observation_paranoid),
|
|
.mode = 0644,
|
|
.proc_handler = proc_dointvec_minmax,
|
|
.extra1 = SYSCTL_ZERO,
|
|
.extra2 = SYSCTL_ONE,
|
|
},
|
|
};
|
|
|
|
/**
|
|
* xe_observation_sysctl_register - Register xe_observation_paranoid sysctl
|
|
*
|
|
* Normally only superuser/root can access observation stream
|
|
* data. However, superuser can set xe_observation_paranoid sysctl to 0 to
|
|
* allow non-privileged users to also access observation data.
|
|
*
|
|
* Return: always returns 0
|
|
*/
|
|
int xe_observation_sysctl_register(void)
|
|
{
|
|
sysctl_header = register_sysctl("dev/xe", observation_ctl_table);
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* xe_observation_sysctl_unregister - Unregister xe_observation_paranoid sysctl
|
|
*/
|
|
void xe_observation_sysctl_unregister(void)
|
|
{
|
|
unregister_sysctl_table(sysctl_header);
|
|
}
|