]) # LIBCFS_SHRINKER_COUNT
#
+# Kernel version 3.13 commit aace05097a0fd467230e39acb148be0fdaa90068
+# add match_wildcard() function.
+#
+AC_DEFUN([LIBCFS_MATCH_WILDCARD],[
+LB_CHECK_COMPILE([does function 'match_wildcard' exist],
+match_wildcard, [
+ #include <linux/parser.h>
+],[
+ bool match;
+
+ match = match_wildcard(NULL, NULL);
+],[
+ AC_DEFINE(HAVE_MATCH_WILDCARD, 1,
+ [match_wildcard() is available])
+])
+]) # LIBCFS_MATCH_WILDCARD
+
+#
+# LIBCFS_HAVE_MAPPING_AS_EXITING_FLAG
+#
+# v3.14-7405-g91b0abe36a7b added AS_EXITING flag with
+# mapping_exiting() and mapping_set_exiting()
+#
+AC_DEFUN([LIBCFS_HAVE_MAPPING_AS_EXITING_FLAG], [
+m4_pattern_allow([AS_EXITING])
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if enum mapping_flags has AS_EXITING flag],
+mapping_exiting_exists, [
+ #include <linux/pagemap.h>
+],[
+ enum mapping_flags flag = AS_EXITING;
+ (void)flag;
+],[
+ AC_DEFINE(HAVE_MAPPING_AS_EXITING_FLAG, 1,
+ [enum mapping_flags has AS_EXITING flag])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_HAVE_MAPPING_AS_EXITING_FLAG
+
+#
# LIBCFS_IOV_ITER_HAS_TYPE
#
# kernel 3.15-rc4 commit 71d8e532b1549a478e6a6a8a44f309d050294d00
]) # LIBCFS_KTIME_GET_SECONDS
#
+# Kernel version 3.19 commit v3.18-rc2-26-g61ada528dea0
+# introduce wait_woken()
+#
+AC_DEFUN([LIBCFS_WAIT_WOKEN],[
+LB_CHECK_COMPILE([does function 'wait_woken' exist],
+wait_woken, [
+ #include <linux/wait.h>
+],[
+ wait_woken(NULL, 0, 0);
+],[
+ AC_DEFINE(HAVE_WAIT_WOKEN, 1,
+ ['wait_woken, is available'])
+])
+]) # LIBCFS_WAIT_WOKEN
+
+#
# Kernel version 4.0 commit 41fbf3b39d5eca01527338b4d0ee15ee1ae1023c
# introduced the helper function ktime_ms_delta.
#
]) # LIBCFS_KSTRTOBOOL_FROM_USER
#
+# LIBCFS_NETLINK_CALLBACK_START
+#
+# Kernel version 4.4-rc3 commit fc9e50f5a5a4e1fa9ba2756f745a13e693cf6a06
+# added a start function callback for struct netlink_callback
+#
+AC_DEFUN([LIBCFS_NETLINK_CALLBACK_START], [
+LB_CHECK_COMPILE([if struct genl_ops has start callback],
+cb_start, [
+ #include <net/genetlink.h>
+],[
+ struct genl_ops ops;
+
+ ops.start = NULL;
+],[
+ AC_DEFINE(HAVE_NETLINK_CALLBACK_START, 1,
+ [struct genl_ops has 'start' callback])
+])
+]) # LIBCFS_NETLINK_CALLBACK_START
+
+#
# Kernel version 4.5-rc1 commit d12481bc58fba89427565f8592e88446ec084a24
# added crypto hash helpers
#
AC_DEFINE(HAVE_3ARG_RHASHTABLE_WALK_INIT, 1,
[rhashtable_walk_init() has 3 args])
])
-]) # LIBCFS_RHASHTABLE_REPLACE
+]) # LIBCFS_RHASHTABLE_WALK_INIT_3ARG
#
# Kernel version 4.8-rc6 commit ca26893f05e86497a86732768ec53cd38c0819ca
AC_DEFINE(HAVE_RHASHTABLE_WALK_ENTER, 1,
[rhashtable_walk_enter() is available])
])
-]) # LIBCFS_RHASHTABLE_REPLACE
+]) # LIBCFS_RHASHTABLE_WALK_ENTER
#
# Kernel version 4.9 commit 768ae309a96103ed02eb1e111e838c87854d8b51
AC_DEFINE(HAVE_KREF_READ, 1,
[kref_read() is available])
])
-]) LIBCFS_KREF_READ
+]) # LIBCFS_KREF_READ
#
# Kernel version 4.11-rc1 commit da20420f83ea0fbcf3d03afda08d971ea1d8a356
]) # LIBCFS_RHT_BUCKET_VAR
#
+# Kernel version 4.11-rc5 commit fceb6435e85298f747fee938415057af837f5a8a
+# began the enhanchement of Netlink with extended ACK struct for advanced
+# error handling. By commit 7ab606d1609dd6dfeae9c8ad0a8a4e051d831e46 we
+# had full support for this new feature.
+#
+AC_DEFUN([LIBCFS_NL_EXT_ACK], [
+LB_CHECK_COMPILE([if Netlink supports netlink_ext_ack],
+netlink_ext_ack, [
+ #include <net/genetlink.h>
+],[
+ struct genl_info info;
+
+ info.extack = NULL;
+],[
+ AC_DEFINE(HAVE_NL_PARSE_WITH_EXT_ACK, 1,
+ [netlink_ext_ack is an argument to nla_parse type function])
+])
+]) # LIBCFS_NL_EXT_ACK
+
+#
# Kernel version 4.11 commit f9fe1c12d126f9887441fa5bb165046f30ddd4b5
# introduced rhashtable_lookup_get_insert_fast
#
]) # LIBCFS_WAIT_QUEUE_TASK_LIST_RENAME
#
+# LIBCFS_WAIT_BIT_QUEUE_ENTRY_EXISTS
+#
+# Kernel version v4.12-rc6-23-g76c85ddc4695
+# sched/wait: Standardize wait_bit_queue naming
+#
+# renamed struct wait_bit_queue => wait_bit_queue_entry
+#
+AC_DEFUN([LIBCFS_WAIT_BIT_QUEUE_ENTRY_EXISTS], [
+LB_CHECK_COMPILE([if struct wait_bit_queue_entry exists],
+struct_wait_bit_queue_entry_exists, [
+ #include <linux/wait.h>
+ #if HAVE_WAIT_BIT_HEADER_H
+ #include <linux/wait_bit.h>
+ #endif
+],[
+ struct wait_bit_queue_entry entry;
+ memset(&entry, 0, sizeof(entry));
+],[
+ AC_DEFINE(HAVE_WAIT_BIT_QUEUE_ENTRY, 1,
+ [if struct wait_bit_queue_entry exists])
+])
+]) # LIBCFS_WAIT_BIT_QUEUE_ENTRY_EXISTS
+
+#
+# LIBCFS_NLA_STRDUP
+#
+# Kernel version 4.13-rc1 commit 2cf0c8b3e6942ecafe6ebb1a6d0328a81641bf39
+# created nla_strdup(). This is needed since push strings can be
+# any size.
+#
+AC_DEFUN([LIBCFS_NLA_STRDUP], [
+LB_CHECK_COMPILE([if 'nla_strdup()' exists],
+nla_strdup, [
+ #include <net/netlink.h>
+],[
+ char *tmp = nla_strdup(NULL, GFP_KERNEL);
+],[
+ AC_DEFINE(HAVE_NLA_STRDUP, 1,
+ ['nla_strdup' is available])
+])
+]) # LIBCFS_NLA_STRDUP
+
+#
# LIBCFS_WAIT_QUEUE_ENTRY
#
# Kernel version 4.13 ac6424b981bce1c4bc55675c6ce11bfe1bbfa64f
]) # LIBCFS_MM_TOTALRAM_PAGES_FUNC
#
-# LIBCFS_NEW_KERNEL_WRITE
+# LIBCFS_NEW_KERNEL_READ
#
# 4.14 commit bdd1d2d3d251c65b74ac4493e08db18971c09240 changed
# the signature of kernel_read to match other read/write helpers
]) # LIBCFS_CLEAR_AND_WAKE_UP_BIT
#
+# LIBCFS_TCP_SOCK_SET_NODELAY
+#
+# kernel 4.18.0-293.el8
+# tcp_sock_set_nodelay() was added
+AC_DEFUN([LIBCFS_TCP_SOCK_SET_NODELAY], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'tcp_sock_set_nodelay()' exists],
+tcp_sock_set_nodelay_exists, [
+ #include <linux/tcp.h>
+],[
+ tcp_sock_set_nodelay(NULL);
+],[
+ AC_DEFINE(HAVE_TCP_SOCK_SET_NODELAY, 1,
+ ['tcp_sock_set_nodelay()' exists])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_TCP_SOCK_SET_NODELAY
+
+#
+# LIBCFS_TCP_SOCK_SET_KEEPIDLE
+#
+# kernel 4.18.0-293.el8
+# tcp_sock_set_keepidle() was added
+AC_DEFUN([LIBCFS_TCP_SOCK_SET_KEEPIDLE], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'tcp_sock_set_keepidle()' exists],
+tcp_sock_set_keepidle_exists, [
+ #include <linux/tcp.h>
+],[
+ tcp_sock_set_keepidle(NULL, 0);
+],[
+ AC_DEFINE(HAVE_TCP_SOCK_SET_KEEPIDLE, 1,
+ ['tcp_sock_set_keepidle()' exists])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_TCP_SOCK_SET_KEEPIDLE
+
+#
+# LIBCFS_TCP_SOCK_SET_QUICKACK
+# kernel v5.7-rc6-2504-gddd061b8daed
+# tcp: add tcp_sock_set_quickack
+#
+AC_DEFUN([LIBCFS_TCP_SOCK_SET_QUICKACK], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'tcp_sock_set_quickack()' exists],
+tcp_sock_set_quickack_exists, [
+ #include <linux/tcp.h>
+],[
+ tcp_sock_set_quickack(NULL, 0);
+],[
+ AC_DEFINE(HAVE_TCP_SOCK_SET_QUICKACK, 1,
+ ['tcp_sock_set_quickack()' exists])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_TCP_SOCK_SET_QUICKACK
+
+#
+# LIBCFS_TCP_SOCK_SET_KEEPINTVL
+# v5.7-rc6-2508-gd41ecaac903c
+# tcp: add tcp_sock_set_keepintvl
+#
+AC_DEFUN([LIBCFS_TCP_SOCK_SET_KEEPINTVL], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'tcp_sock_set_keepintvl()' exists],
+tcp_sock_set_keepintvl_exists, [
+ #include <linux/tcp.h>
+],[
+ tcp_sock_set_keepintvl(NULL, 0);
+],[
+ AC_DEFINE(HAVE_TCP_SOCK_SET_KEEPINTVL, 1,
+ ['tcp_sock_set_keepintvl()' exists])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_TCP_SOCK_SET_KEEPINTVL
+
+#
+# LIBCFS_TCP_SOCK_SET_KEEPCNT
+# v5.7-rc6-2509-g480aeb9639d6
+# tcp: add tcp_sock_set_keepcnt
+#
+AC_DEFUN([LIBCFS_TCP_SOCK_SET_KEEPCNT], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'tcp_sock_set_keepcnt()' exists],
+tcp_sock_set_keepcnt_exists, [
+ #include <linux/tcp.h>
+],[
+ tcp_sock_set_keepcnt(NULL, 0);
+],[
+ AC_DEFINE(HAVE_TCP_SOCK_SET_KEEPCNT, 1,
+ ['tcp_sock_set_keepcnt()' exists])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_TCP_SOCK_SET_KEEPCNT
+
+#
# LIBCFS_XARRAY_SUPPORT
#
# 4.19-rc5 kernel commit 3159f943aafdbacb2f94c38fdaadabf2bbde2a14
]) # LIBCFS_XARRAY_SUPPORT
#
+# Kernel version 4.19-rc6 commit 4a19edb60d0203cd5bf95a8b46ea8f63fd41194c
+# added extended ACK handling to Netlink dump handlers
+#
+AC_DEFUN([LIBCFS_NL_DUMP_EXT_ACK], [
+LB_CHECK_COMPILE([if Netlink dump handlers support ext_ack],
+netlink_dump_ext_ack, [
+ #include <net/netlink.h>
+],[
+ struct netlink_callback *cb = NULL;
+ cb->extack = NULL;
+],[
+ AC_DEFINE(HAVE_NL_DUMP_WITH_EXT_ACK, 1,
+ [netlink_ext_ack is handled for Netlink dump handlers])
+])
+]) # LIBCFS_NL_DUMP_EXT_ACK
+
+#
# LIBCFS_HAVE_IOV_ITER_TYPE
#
# kernel 4.20 commit 00e23707442a75b404392cef1405ab4fd498de6b
]) # LIBCFS_CACHE_DETAIL_WRITERS
#
+# LIBCFS_KALLSYMS_LOOKUP
+#
+# kernel v5.6-11591-g0bd476e6c671
+# kallsyms: unexport kallsyms_lookup_name() and kallsyms_on_each_symbol()
+AC_DEFUN([LIBCFS_KALLSYMS_LOOKUP], [
+LB_CHECK_EXPORT([kallsyms_lookup_name], [kernel/kallsyms.c],
+ [AC_DEFINE(HAVE_KALLSYMS_LOOKUP_NAME, 1,
+ [kallsyms_lookup_name is exported by kernel])])
+]) # LIBCFS_KALLSYMS_LOOKUP
+
+#
+# v5.5-8862-gd56c0d45f0e2
+# proc: decouple proc from VFS with "struct proc_ops"
+#
+AC_DEFUN([LIBCFS_SRC_HAVE_PROC_OPS], [
+ LB2_LINUX_TEST_SRC([proc_ops], [
+ #include <linux/proc_fs.h>
+
+ static struct proc_ops *my_proc;
+ ],[
+ my_proc->proc_lseek = NULL;
+ ],[-Werror])
+]) # LIBCFS_SRC_HAVE_PROC_OPS
+AC_DEFUN([LIBCFS_HAVE_PROC_OPS], [
+ AC_MSG_CHECKING([if struct proc_ops exists])
+ LB2_LINUX_TEST_RESULT([proc_ops], [
+ AC_DEFINE(HAVE_PROC_OPS, 1,
+ [struct proc_ops exists])
+ AC_MSG_RESULT(yes)
+ ],[
+ AC_MSG_RESULT(no)
+ ])
+]) # LIBCFS_HAVE_PROC_OPS
+
+#
+# LIBCFS_VMALLOC_2ARGS
+#
+# kernel v5.8-rc1~201^2~19
+# mm: remove the pgprot argument to __vmalloc
+AC_DEFUN([LIBCFS_VMALLOC_2ARGS], [
+LB_CHECK_COMPILE([if __vmalloc has 2 args],
+vmalloc_2args, [
+ #include <linux/vmalloc.h>
+],[
+ __vmalloc(0, 0);
+],[
+ AC_DEFINE(HAVE_VMALLOC_2ARGS, 1,
+ [__vmalloc only takes 2 args.])
+])
+]) # LIBCFS_VMALLOC_2ARGS
+
+#
# LIBCFS_HAVE_NR_UNSTABLE_NFS
#
# kernel v5.8-rc1~201^2~75
EXTRA_KCFLAGS="$tmp_flags"
]) # LIBCFS_HAVE_NR_UNSTABLE_NFS
-AC_DEFUN([LIBCFS_PROG_LINUX_SRC], [] )
-AC_DEFUN([LIBCFS_PROG_LINUX_RESULTS], [])
+#
+# LIBCFS_HAVE_MMAP_LOCK
+#
+# kernel v5.8-rc1~83^2~24
+# mmap locking API: rename mmap_sem to mmap_lock
+#
+AC_DEFUN([LIBCFS_HAVE_MMAP_LOCK], [
+LB_CHECK_COMPILE([if mmap_lock API is available],
+mmap_write_lock, [
+ #include <linux/mm.h>
+],[
+ mmap_write_lock(NULL);
+],[
+ AC_DEFINE(HAVE_MMAP_LOCK, 1,
+ [mmap_lock API is available.])
+])
+]) # LIBCFS_HAVE_MMAP_LOCK
+
+#
+# LIBCFS_KERNEL_SETSOCKOPT
+#
+# kernel v5.8-rc1~165^2~59^2
+# net: remove kernel_setsockopt
+AC_DEFUN([LIBCFS_KERNEL_SETSOCKOPT], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if kernel_setsockopt still in use],
+kernel_setsockopt_exists, [
+ #include <linux/net.h>
+],[
+ kernel_setsockopt(NULL, 0, 0, NULL, 0);
+],[
+ AC_DEFINE(HAVE_KERNEL_SETSOCKOPT, 1,
+ [kernel_setsockopt still in use])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_KERNEL_SETSOCKOPT
+
+#
+# LIBCFS_SEC_RELEASE_SECCTX
+#
+# kernel linux-hwe-5.8 (5.8.0-22.23~20.04.1)
+# LSM: Use lsmcontext in security_release_secctx
+AC_DEFUN([LIBCFS_SEC_RELEASE_SECCTX], [
+LB_CHECK_COMPILE([if security_release_secctx has 1 arg],
+security_release_secctx_1arg, [
+ #include <linux/security.h>
+],[
+ security_release_secctx(NULL);
+],[
+ AC_DEFINE(HAVE_SEC_RELEASE_SECCTX_1ARG, 1,
+ [security_release_secctx has 1 arg.])
+])
+]) # LIBCFS_SEC_RELEASE_SECCTX
+
+#
+# LIBCFS_HAVE_KFREE_SENSITIVE
+#
+# kernel v5.10-rc1~3
+# mm: remove kzfree() compatibility definition
+#
+AC_DEFUN([LIBCFS_HAVE_KFREE_SENSITIVE], [
+LB_CHECK_COMPILE([if kfree_sensitive() is available],
+kfree_sensitive_exists, [
+ #include <linux/slab.h>
+
+],[
+ kfree_sensitive(NULL);
+],[
+ AC_DEFINE(HAVE_KFREE_SENSITIVE, 1,
+ [kfree_sensitive() is available.])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_HAVE_KFREE_SENSITIVE
+
+#
+# LIBCFS_HAVE_CRYPTO_SHA2_HEADER
+#
+# Kernel v5.10-rc1-114-ga24d22b225ce
+# crypto: sha - split sha.h into sha1.h and sha2.h
+#
+AC_DEFUN([LIBCFS_HAVE_CRYPTO_SHA2_HEADER], [
+LB_CHECK_LINUX_HEADER([crypto/sha2.h], [
+ AC_DEFINE(HAVE_CRYPTO_SHA2_HEADER, 1,
+ [crypto/sha2.h is present])])
+]) # LIBCFS_HAVE_CRYPTO_SHA2_HEADER
+
+#
+# LIBCFS_HAVE_LIST_CMP_FUNC_T
+#
+# kernel 5.10.70 commit 4f0f586bf0c898233d8f316f471a21db2abd522d
+# treewide: Change list_sort to use const pointers
+AC_DEFUN([LIBCFS_HAVE_LIST_CMP_FUNC_T], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror -Wno-unused-variable"
+LB_CHECK_COMPILE([if list_cmp_func_t type is defined],
+list_cmp_func_t, [
+ #include <linux/list_sort.h>
+],[
+ list_cmp_func_t cmp;
+],[
+ AC_DEFINE(HAVE_LIST_CMP_FUNC_T, 1,
+ [list_cmp_func_t type is defined])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_HAVE_LIST_CMP_FUNC_T
+
+AC_DEFUN([LIBCFS_PROG_LINUX_SRC], [
+ LIBCFS_SRC_HAVE_PROC_OPS
+
+ AC_MSG_CHECKING([for available kernel interfaces to libcfs])
+ LB2_LINUX_TEST_COMPILE_ALL([libcfs])
+ AC_MSG_RESULT([done])
+])
+AC_DEFUN([LIBCFS_PROG_LINUX_RESULTS], [
+ # 5.6
+ LIBCFS_HAVE_PROC_OPS
+])
+
+#
+# LIBCFS_PARAM_SET_UINT_MINMAX
+#
+# Kernel 5.15-rc1 commit 2a14c9ae15a38148484a128b84bff7e9ffd90d68
+# moved param_set_uint_minmax to common code
+#
+AC_DEFUN([LIBCFS_PARAM_SET_UINT_MINMAX],[
+LB_CHECK_COMPILE([does function 'param_set_uint_minmax' exist],
+param_set_uint_minmax, [
+ #include <linux/moduleparam.h>
+],[
+ param_set_uint_minmax(NULL, NULL, 0, 0);
+],[
+ AC_DEFINE(HAVE_PARAM_SET_UINT_MINMAX, 1,
+ ['param_set_uint_minmax' is available])
+])
+]) # LIBCFS_PARAM_SET_UINT_MINMAX
#
# LIBCFS_PROG_LINUX
LIBCFS_KTIME_BEFORE
LIBCFS_KTIME_COMPARE
LIBCFS_SHRINKER_COUNT
+# 3.13
+LIBCFS_MATCH_WILDCARD
# 3.15
+LIBCFS_HAVE_MAPPING_AS_EXITING_FLAG
LIBCFS_IOV_ITER_HAS_TYPE
# 3.16
LIBCFS_HAVE_NS_TO_TIMESPEC64
LIBCFS_TIMESPEC64_TO_KTIME
# 3.19
LIBCFS_KTIME_GET_SECONDS
+LIBCFS_WAIT_WOKEN
# 4.0
LIBCFS_KTIME_MS_DELTA
# 4.1
LIBCFS_HAVE_TOPOLOGY_SIBLING_CPUMASK
# 4.4
LIBCFS_KSTRTOBOOL_FROM_USER
+LIBCFS_NETLINK_CALLBACK_START
# 4.5
LIBCFS_CRYPTO_HASH_HELPERS
LIBCFS_EXPORT_KSET_FIND_OBJ
LIBCFS_HAVE_PROCESSOR_HEADER
LIBCFS_HAVE_WAIT_BIT_HEADER
LIBCFS_MEMALLOC_NORECLAIM
+LIBCFS_NL_EXT_ACK
LIBCFS_WAIT_QUEUE_TASK_LIST_RENAME
LIBCFS_CPUS_READ_LOCK
LIBCFS_UUID_T
# 4.13
+LIBCFS_NLA_STRDUP
LIBCFS_WAIT_QUEUE_ENTRY
+LIBCFS_WAIT_BIT_QUEUE_ENTRY_EXISTS
# 4.14
LIBCFS_DEFINE_TIMER
LIBCFS_NEW_KERNEL_WRITE
# 4.17
LIBCFS_BITMAP_ALLOC
LIBCFS_CLEAR_AND_WAKE_UP_BIT
+# 4.18
+LIBCFS_TCP_SOCK_SET_NODELAY
+LIBCFS_TCP_SOCK_SET_KEEPIDLE
# 4.19
LIBCFS_XARRAY_SUPPORT
+LIBCFS_NL_DUMP_EXT_ACK
# 4.20
LIBCFS_HAVE_IOV_ITER_TYPE
# 5.0
LIBCFS_FORCE_SIG_WITH_TASK
LIBCFS_CACHE_DETAIL_WRITERS
LIBCFS_HAVE_NR_UNSTABLE_NFS
+# 5.7
+LIBCFS_KALLSYMS_LOOKUP
+LIBCFS_TCP_SOCK_SET_QUICKACK
+LIBCFS_TCP_SOCK_SET_KEEPINTVL
+LIBCFS_TCP_SOCK_SET_KEEPCNT
+# 5.8
+LIBCFS_HAVE_MMAP_LOCK
+LIBCFS_KERNEL_SETSOCKOPT
+LIBCFS_VMALLOC_2ARGS
+LIBCFS_SEC_RELEASE_SECCTX
+# 5.10
+LIBCFS_HAVE_KFREE_SENSITIVE
+LIBCFS_HAVE_CRYPTO_SHA2_HEADER
+LIBCFS_HAVE_LIST_CMP_FUNC_T
+# 5.15
+LIBCFS_PARAM_SET_UINT_MINMAX
]) # LIBCFS_PROG_LINUX
#