Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp481720ybk; Fri, 15 May 2020 05:56:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyf+hjN4f7UgHtOnRaogsWAtEkDzZXyrrlXeeLkm/sXIGuBC1UnhoWT57rMi9ecj8bl2jfH X-Received: by 2002:a17:906:31d7:: with SMTP id f23mr2702877ejf.59.1589547376343; Fri, 15 May 2020 05:56:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589547376; cv=none; d=google.com; s=arc-20160816; b=nSvniZ/2bEW1Bla3CMJTMTtr0oGnxVRftcpTDXQ3NyMC496FrpMsE5/jSepDNvzn8X Yb5F9qX9SkcmFcOUm+O1HM0s4mkBhMLhXfM5UQp2NN0X4w+NXQOFIj6ZMHZ+Nz4Ux8x6 XxE14cCdXmzNo5r7Ztto2e+whUpHeXB8tzwGNjMgDRuzYbLrJSv2Rvsgi96jnqee7IbZ Z7oNRjioEudl/nDk07+hcTc5ARAyisH/VDt9eBrBP83D/VouXaXj2NB0s9FaRXBWDKhx OIR+fPLbYMlLESWTAvFSYSh+3VO8a6d0+FQ9oN9WZY8M5g02aZaquSRqbFYbeqX9Znuy AHRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=FZ4vH/Wl0tkdlsNF7iz0dUMGrwmCxx8mgEa/IsWM0zQ=; b=XVDKnsZRSDArJgb9g2BDqqinXn+Y+1QwkVkapLN29A0QC/0tglGI7nLM0NmCS4nW0h cTJeKHs8++Iv+xTuTiD0a1UnvZHYOkF90MakGT+57ENiEJZ8axNMvJ7DJoUDs4ZQSOHC PbOohj9JWCuTBiDkMhtgQqokAGFwBS2EX9C+Rhhu6X4EwRF6b3T955b0fwXqG4Yq9e7s 8jIADHCTLUND60NC0xE/XmCleus9aHHjHu9oPazhvuBesHkE8strnHXk5SNh/9sUHMi0 LOhircnecfOL5rsWMlpirPywg5AMfmA9vO7+2bPpYMu859hPw7bJFWoBX4CVKPQPNJrU o9ug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="M/zXyDtw"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n8si1177121ejh.210.2020.05.15.05.55.53; Fri, 15 May 2020 05:56:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="M/zXyDtw"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726231AbgEOMya (ORCPT + 99 others); Fri, 15 May 2020 08:54:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:38386 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726168AbgEOMy3 (ORCPT ); Fri, 15 May 2020 08:54:29 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E4FF420787; Fri, 15 May 2020 12:54:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589547268; bh=TotoL9YXsj+E4MwRDKyj3GbWs9IEi6m6QDbCpdIsCQM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=M/zXyDtwPlnFMqEQDPslfgMp9FZncwD5Y623ZF6geSYAJDxstXP18RdhxSzkoQv5C +2UlOmeRnhVgPrsdSsTLzBIoBlufLx5x7KT25dXY3Q0bvDa0jwMOPg8fBIZblClI6G YRoRBwIqyER8H2ya1QhRxnTyos5uf8y+IjyLsbZs= Date: Fri, 15 May 2020 14:54:17 +0200 From: Greg Kroah-Hartman To: Emil Velikov Cc: dri-devel@lists.freedesktop.org, Jiri Slaby , linux-kernel@vger.kernel.org, Richard Henderson , Ivan Kokshaysky , Matt Turner , linux-alpha@vger.kernel.org Subject: Re: [PATCH 01/11] tty/sysrq: alpha: export and use __sysrq_get_key_op() Message-ID: <20200515125417.GA1928406@kroah.com> References: <20200513214351.2138580-1-emil.l.velikov@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200513214351.2138580-1-emil.l.velikov@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 13, 2020 at 10:43:41PM +0100, Emil Velikov wrote: > Export a pointer to the sysrq_get_key_op(). This way we can cleanly > unregister it, instead of the current solutions of modifuing it inplace. > > Since __sysrq_get_key_op() is no longer used externally, let's make it > a static function. > > This patch will allow us to limit access to each and every sysrq op and > constify the sysrq handling. > > Cc: Greg Kroah-Hartman > Cc: Jiri Slaby > Cc: linux-kernel@vger.kernel.org > Cc: Richard Henderson > Cc: Ivan Kokshaysky > Cc: Matt Turner > Cc: linux-alpha@vger.kernel.org > Signed-off-by: Emil Velikov > --- > Please keep me in the CC list, as I'm not subscribed to the list. > > IMHO it would be better if this gets merged this via the tty tree. All now taken, thanks! greg k-h