From patchwork Wed Nov 1 18:48:00 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jakub Kicinski X-Patchwork-Id: 833083 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=netronome-com.20150623.gappssmtp.com header.i=@netronome-com.20150623.gappssmtp.com header.b="CGWq5AIj"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3yRy0C6m4Fz9t2V for ; Thu, 2 Nov 2017 05:48:11 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754910AbdKASsJ (ORCPT ); Wed, 1 Nov 2017 14:48:09 -0400 Received: from mail-pf0-f193.google.com ([209.85.192.193]:50645 "EHLO mail-pf0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753080AbdKASsH (ORCPT ); Wed, 1 Nov 2017 14:48:07 -0400 Received: by mail-pf0-f193.google.com with SMTP id b6so2617217pfh.7 for ; Wed, 01 Nov 2017 11:48:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netronome-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id; bh=8XMjyxI0Wb6B4vXJQPLwvP5BehUswbGR8/J5EphMuX0=; b=CGWq5AIjQmXu4uPLhvAHjZj/XZ8QZo9nESq6lPhS8gzw/SsSW2c6zRgooX1EcfSEv1 VE0jKBrhU8TKgNBPSYbKyaWmF/p0p5yZzgs5uGV4XCWoiDWC2Ix65PWpek1ajDOYo25J KI/AUPhn5Z1eoW/zXrjiUvJWEsixFc4aJNTsFYuAxZVVBvezqwiVxvDq7f5dHV0TbbEk PymuVj4G3Ds83CgBaIQtEDIERbErpNI0tOZcVRF4iGeUGrO/xSA8v0CmO+QFC4hRmqvk 9kbo1NS1lwaNKoFqkEdctGEG0ybjHBEa4ip3QNPrORD87CgX99KHqC6zCTiFFJx/drCI F4oQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=8XMjyxI0Wb6B4vXJQPLwvP5BehUswbGR8/J5EphMuX0=; b=i2TW8VU5zZ6fIUInFzcHV9cLez+HM8yAtcOx2hhcS3kZr1/3CpaYgPUozM2InNnPdL ShGhk5umC7lk0W2sVrM1/LkPYLGCdh182gb9tk9lJrCSu1NSiDzvUocLklIH4OK7XQLH y0Ac/YTtmnxjUmkHPdASIQK2bmX50vn7QID4tT10JidJp0dXzAwU/lpk4aWU2twWGTxR ldyl5P1QT0Kx+zt1ojb3Y7+wPXtjnhoUBi7zbRmyt5lgHCrr9Lr2OEPMNeey+eeTpy/M E+gcKKJxgdDr3Dc29+l8pRh9sesar7T0PjZ13wl67lCENVop8Nm/VnghINBkFixGlsJb jBlw== X-Gm-Message-State: AMCzsaWeS0Px2ErkhLg5liMJLnpzW/VyOcCYS1sURijISZtKEU+Gw26r i/ldvFeouHzA71UdfHAdzN2dXEI7 X-Google-Smtp-Source: ABhQp+SgzbWPWU8EsPPeL1nLAGDmCTk65JW0JMOJgT30i0o4rj1wQBaTtfKFV1mN0zC++vmZKUju0Q== X-Received: by 10.99.165.25 with SMTP id n25mr801408pgf.294.1509562086932; Wed, 01 Nov 2017 11:48:06 -0700 (PDT) Received: from jkicinski-Precision-T1700.netronome.com ([75.53.12.129]) by smtp.gmail.com with ESMTPSA id q8sm2695772pfk.100.2017.11.01.11.48.05 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 01 Nov 2017 11:48:06 -0700 (PDT) From: Jakub Kicinski To: netdev@vger.kernel.org Cc: oss-drivers@netronome.com, alexei.starovoitov@gmail.com, daniel@iogearbox.net, Chenbo Feng , Jakub Kicinski Subject: [PATCH net-next] security: bpf: replace include of linux/bpf.h with forward declarations Date: Wed, 1 Nov 2017 11:48:00 -0700 Message-Id: <20171101184800.16416-1-jakub.kicinski@netronome.com> X-Mailer: git-send-email 2.14.1 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Touching linux/bpf.h makes us rebuild a surprisingly large portion of the kernel. Remove the unnecessary dependency from security.h, it only needs forward declarations. Signed-off-by: Jakub Kicinski Reviewed-by: Quentin Monnet Acked-by: Alexei Starovoitov Acked-by: Daniel Borkmann --- include/linux/security.h | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/include/linux/security.h b/include/linux/security.h index 18800b0911e5..73f1ef625d40 100644 --- a/include/linux/security.h +++ b/include/linux/security.h @@ -31,7 +31,6 @@ #include #include #include -#include struct linux_binprm; struct cred; @@ -1732,6 +1731,10 @@ static inline void securityfs_remove(struct dentry *dentry) #endif #ifdef CONFIG_BPF_SYSCALL +union bpf_attr; +struct bpf_map; +struct bpf_prog; +struct bpf_prog_aux; #ifdef CONFIG_SECURITY extern int security_bpf(int cmd, union bpf_attr *attr, unsigned int size); extern int security_bpf_map(struct bpf_map *map, fmode_t fmode);