]> git.kernelconcepts.de Git - karo-tx-linux.git/commitdiff
uapi: move forward declarations of internal structures
authorAlexey Dobriyan <adobriyan@gmail.com>
Tue, 2 Aug 2016 21:03:36 +0000 (14:03 -0700)
committerLinus Torvalds <torvalds@linux-foundation.org>
Tue, 2 Aug 2016 21:31:41 +0000 (17:31 -0400)
Don't user forward declarations of internal kernel structures in headers
exported to userspace.

Move "struct completion;".
Move "struct task_struct;".

Link: http://lkml.kernel.org/r/20160713215808.GA22486@p183.telecom.by
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
include/linux/capability.h
include/linux/sysctl.h
include/uapi/linux/capability.h
include/uapi/linux/sysctl.h

index 5f3c63dde2d5acb41077b879cf67758dd63a51e3..dbc21c719ce61b4aa45e90af3ec62ed9ced57b26 100644 (file)
@@ -38,6 +38,7 @@ struct cpu_vfs_cap_data {
 struct file;
 struct inode;
 struct dentry;
+struct task_struct;
 struct user_namespace;
 
 extern const kernel_cap_t __cap_empty_set;
index fa7bc29925c929a36e0f1e53a3a7efc1a18cc9e6..697e160c78d0d7afd65dcf9ea07afaccd431669c 100644 (file)
@@ -28,6 +28,7 @@
 #include <uapi/linux/sysctl.h>
 
 /* For the /proc/sys support */
+struct completion;
 struct ctl_table;
 struct nsproxy;
 struct ctl_table_root;
index 12c37a197d247ca980fef9c6e81ed0c067f27987..49bc0629539879c8edc3ae83e4b1933bdfc1dcbd 100644 (file)
@@ -15,8 +15,6 @@
 
 #include <linux/types.h>
 
-struct task_struct;
-
 /* User-level do most of the mapping between kernel and user
    capabilities based on the version tag given by the kernel. The
    kernel might be somewhat backwards compatible, but don't bet on
index 0956373b56db7825c965fa18084bfedb3f21df3c..d2b12152e358f14e791ef3e842cb6eac7cc8ceec 100644 (file)
@@ -26,8 +26,6 @@
 #include <linux/types.h>
 #include <linux/compiler.h>
 
-struct completion;
-
 #define CTL_MAXNAME 10         /* how many path components do we allow in a
                                   call to sysctl?   In other words, what is
                                   the largest acceptable value for the nlen