Dmitry Torokhov <dmitry.torok...@gmail.com> writes: > Similarly to module_param_unsafe(), add the helper to be used by core > code wishing to expose unsafe debugging or testing parameters that taint > the kernel when set. > > Signed-off-by: Dmitry Torokhov <dmitry.torok...@gmail.com>
Acked-by: Rusty Russell <ru...@rustcorp.com.au> Thanks, Rusty. > --- > include/linux/moduleparam.h | 9 +++++++++ > 1 file changed, 9 insertions(+) > > diff --git a/include/linux/moduleparam.h b/include/linux/moduleparam.h > index 1392370..6480dca 100644 > --- a/include/linux/moduleparam.h > +++ b/include/linux/moduleparam.h > @@ -310,6 +310,15 @@ static inline void __kernel_param_unlock(void) > #define core_param(name, var, type, perm) \ > param_check_##type(name, &(var)); \ > __module_param_call("", name, ¶m_ops_##type, &var, perm, -1, 0) > + > +/** > + * core_param_unsafe - same as core_param but taints kernel > + */ > +#define core_param_unsafe(name, var, type, perm) \ > + param_check_##type(name, &(var)); \ > + __module_param_call("", name, ¶m_ops_##type, &var, perm, \ > + -1, KERNEL_PARAM_FL_UNSAFE) > + > #endif /* !MODULE */ > > /** > -- > 2.2.0.rc0.207.ga3a616c -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/