Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6621398imu; Mon, 21 Jan 2019 12:19:09 -0800 (PST) X-Google-Smtp-Source: ALg8bN5F+aeuZLlCbsWI4CypTJ+e3n5ulJgPNUlCl/YMrgdybLEjfGgAlACbgJ4vIVR2bZZFMdCp X-Received: by 2002:a17:902:bd0a:: with SMTP id p10mr30509725pls.322.1548101949242; Mon, 21 Jan 2019 12:19:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548101949; cv=none; d=google.com; s=arc-20160816; b=L6B/jFTG6FPmiYi1LvBuDvbc/c6kjdAdOZISJ9wPjHuJcsNeF6rX/SJCEJXABCmK7u SLg7dlxwH5/wZyBFqMsyfVFkJmz4svI0jec0kwCTbw4Ot8ZlRreeZlpr6OV8FyLgKdf4 /W4gakAEiZRSZIUFEKLmjDzrTWUEtN9CqQE2wH31VKXs5B51lkf8c7P5gL3xiwLM2v7r PXrmpIsV+Ye3ZHFfVTXuBMV1fDfsxTDYz7Xt4TwsaNMXmKgyDL7yq4f3/JcA9nPFTzrs qiUcZ7pp6P2W3oeUToAeMDEQdEXoMWxzZd3Xx1+nCZCRHOALA8yAr8Nr0RZE7LJRc5q3 nCJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:from; bh=DMwo23AQrM+UwU6JAnZJkhxfQkhz18SXGebZg+Ep1wg=; b=DSbyKvVfPd/OaOLfAP0Xa2izf+H/wBZNvazebrCp7g5pWKW4jpqDfiM421mJk2/XZO 6r+aqsVmhAwiQdq1U5AI5ZT37ClKjmlbuL1jzF64EF2HyFZooTRwCWkCXKPcwRNk2exl wlSOWL9ovLPTsxaxDsaLcejsl4eeATWmq8H4x39Sb9FxQYHtDPMy0RAdb9ccO1ktBiCl xal5OMMPH+9SlsiC7PSojIsAKw55BxjNbppUpcG9K4XyOb5dMIrz883MllcJgIvYs09M h2HcnqfqecSVzD8yHKq2Hroy9stU6qH9RFv0x8VJ+flefJnPX0GtoPoKLrXiXeTwHF0m UrmA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u11si14204802plm.8.2019.01.21.12.18.53; Mon, 21 Jan 2019 12:19:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728068AbfAUUPO (ORCPT + 99 others); Mon, 21 Jan 2019 15:15:14 -0500 Received: from mx2.suse.de ([195.135.220.15]:55518 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727699AbfAUUPN (ORCPT ); Mon, 21 Jan 2019 15:15:13 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 7B9C0AFF4; Mon, 21 Jan 2019 20:15:12 +0000 (UTC) From: Roman Penyaev Cc: Roman Penyaev , Andrew Morton , Davidlohr Bueso , Jason Baron , Al Viro , "Paul E. McKenney" , Linus Torvalds , Andrea Parri , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH v2 01/13] epoll: move private helpers from a header to the source Date: Mon, 21 Jan 2019 21:14:44 +0100 Message-Id: <20190121201456.28338-2-rpenyaev@suse.de> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190121201456.28338-1-rpenyaev@suse.de> References: <20190121201456.28338-1-rpenyaev@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Those helpers will access private eventpoll structure in future patches, so keep those helpers close to callers. Nothing important here. Signed-off-by: Roman Penyaev Cc: Andrew Morton Cc: Davidlohr Bueso Cc: Jason Baron Cc: Al Viro Cc: "Paul E. McKenney" Cc: Linus Torvalds Cc: Andrea Parri Cc: linux-fsdevel@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- fs/eventpoll.c | 13 +++++++++++++ include/uapi/linux/eventpoll.h | 12 ------------ 2 files changed, 13 insertions(+), 12 deletions(-) diff --git a/fs/eventpoll.c b/fs/eventpoll.c index 4a0e98d87fcc..2cc183e86a29 100644 --- a/fs/eventpoll.c +++ b/fs/eventpoll.c @@ -466,6 +466,19 @@ static inline void ep_set_busy_poll_napi_id(struct epitem *epi) #endif /* CONFIG_NET_RX_BUSY_POLL */ +#ifdef CONFIG_PM_SLEEP +static inline void ep_take_care_of_epollwakeup(struct epoll_event *epev) +{ + if ((epev->events & EPOLLWAKEUP) && !capable(CAP_BLOCK_SUSPEND)) + epev->events &= ~EPOLLWAKEUP; +} +#else +static inline void ep_take_care_of_epollwakeup(struct epoll_event *epev) +{ + epev->events &= ~EPOLLWAKEUP; +} +#endif /* CONFIG_PM_SLEEP */ + /** * ep_call_nested - Perform a bound (possibly) nested call, by checking * that the recursion limit is not exceeded, and that diff --git a/include/uapi/linux/eventpoll.h b/include/uapi/linux/eventpoll.h index 8a3432d0f0dc..39dfc29f0f52 100644 --- a/include/uapi/linux/eventpoll.h +++ b/include/uapi/linux/eventpoll.h @@ -79,16 +79,4 @@ struct epoll_event { __u64 data; } EPOLL_PACKED; -#ifdef CONFIG_PM_SLEEP -static inline void ep_take_care_of_epollwakeup(struct epoll_event *epev) -{ - if ((epev->events & EPOLLWAKEUP) && !capable(CAP_BLOCK_SUSPEND)) - epev->events &= ~EPOLLWAKEUP; -} -#else -static inline void ep_take_care_of_epollwakeup(struct epoll_event *epev) -{ - epev->events &= ~EPOLLWAKEUP; -} -#endif #endif /* _UAPI_LINUX_EVENTPOLL_H */ -- 2.19.1