Searched +hist:36 +hist:fcb589 (Results 1 - 1 of 1) sorted by relevance
/linux-master/include/linux/ | ||
H A D | sysctl.h | diff a2071573 Mon Aug 02 16:59:36 MDT 2021 Jia He <hejianet@gmail.com> sysctl: introduce new proc handler proc_dobool This is to let bool variable could be correctly displayed in big/little endian sysctl procfs. sizeof(bool) is arch dependent, proc_dobool should work in all arches. Suggested-by: Pan Xinhui <xinhui@linux.vnet.ibm.com> Signed-off-by: Jia He <hejianet@gmail.com> [thuth: rebased the patch to the current kernel version] Signed-off-by: Thomas Huth <thuth@redhat.com> Signed-off-by: Chuck Lever <chuck.lever@oracle.com> diff 2374c09b Fri Apr 24 00:43:36 MDT 2020 Christoph Hellwig <hch@lst.de> sysctl: remove all extern declaration from sysctl.c Extern declarations in .c files are a bad style and can lead to mismatches. Use existing definitions in headers where they exist, and otherwise move the external declarations to suitable header files. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> diff e79c6a4f Wed Aug 10 15:36:02 MDT 2016 Dmitry Torokhov <dmitry.torokhov@gmail.com> net: make net namespace sysctls belong to container's owner If net namespace is attached to a user namespace let's make container's root owner of sysctls affecting said network namespace instead of global root. This also allows us to clean up net_ctl_permissions() because we do not need to fudge permissions anymore for the container's owner since it now owns the objects in question. Acked-by: "Eric W. Biederman" <ebiederm@xmission.com> Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> diff db3f6001 Tue Aug 02 15:03:36 MDT 2016 Alexey Dobriyan <adobriyan@gmail.com> uapi: move forward declarations of internal structures Don't user forward declarations of internal kernel structures in headers exported to userspace. Move "struct completion;". Move "struct task_struct;". Link: http://lkml.kernel.org/r/20160713215808.GA22486@p183.telecom.by Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> diff 36fcb589 Tue Jul 26 01:47:31 MDT 2011 Al Viro <viro@zeniv.linux.org.uk> sysctl: use umode_t for table permissions Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> diff 36fcb589 Tue Jul 26 01:47:31 MDT 2011 Al Viro <viro@zeniv.linux.org.uk> sysctl: use umode_t for table permissions Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> diff 4739a974 Fri Apr 03 06:36:01 MDT 2009 Eric W. Biederman <ebiederm@xmission.com> sysctl: Remove the last of the generic binary sysctl support Now that all of the users stopped using ctl_name and strategy it is safe to remove the fields from struct ctl_table, and it is safe to remove the stub strategy routines as well. Signed-off-by: Eric W. Biederman <ebiederm@xmission.com> diff 462591b8 Wed Feb 14 01:33:36 MST 2007 Eric W. Biederman <ebiederm@xmission.com> [PATCH] sysctl: move CTL_PM into sysctl.h where it belongs Signed-off-by: Eric W. Biederman <ebiederm@xmission.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> diff 39e21c0d Thu Feb 08 14:34:36 MST 2007 Andrew Hendry <andrew.hendry@gmail.com> [X.25]: Adds /proc/sys/net/x25/x25_forward to control forwarding. echo "1" > /proc/sys/net/x25/x25_forward To turn on x25_forwarding, defaults to off Requires the previous patch. Signed-off-by: Andrew Hendry <andrew.hendry@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> 1da177e4 Sat Apr 16 16:20:36 MDT 2005 Linus Torvalds <torvalds@ppc970.osdl.org> Linux-2.6.12-rc2 Initial git repository build. I'm not bothering with the full history, even though we have it. We can create a separate "historical" git archive of that later if we want to, and in the meantime it's about 3.2GB when imported into git - space that would just make the early git days unnecessarily complicated, when we don't have a lot of good infrastructure for it. Let it rip! |
Completed in 172 milliseconds