]) # LIBCFS_CONFIG_PANIC_DUMPLOG
#
-# LIBCFS_STACKTRACE_OPS_HAVE_WALK_STACK
-#
-# 2.6.32-30.el6 adds a new 'walk_stack' field in 'struct stacktrace_ops'
-#
-AC_DEFUN([LIBCFS_STACKTRACE_OPS_HAVE_WALK_STACK], [
-LB_CHECK_COMPILE([if 'struct stacktrace_ops' has 'walk_stack' field],
-stacktrace_ops_walk_stack, [
- #include <asm/stacktrace.h>
-],[
- ((struct stacktrace_ops *)0)->walk_stack(NULL, NULL, 0, NULL, NULL, NULL, NULL);
-],[
- AC_DEFINE(STACKTRACE_OPS_HAVE_WALK_STACK, 1,
- ['struct stacktrace_ops' has 'walk_stack' field])
-])
-]) # LIBCFS_STACKTRACE_OPS_HAVE_WALK_STACK
-
-#
-# LIBCFS_STACKTRACE_WARNING
-#
-# 3.0 removes stacktrace_ops warning* functions
-#
-AC_DEFUN([LIBCFS_STACKTRACE_WARNING], [
-LB_CHECK_COMPILE([if 'stacktrace_ops.warning' is exist],
-stacktrace_ops_warning, [
- struct task_struct;
- struct pt_regs;
- #include <asm/stacktrace.h>
-],[
- ((struct stacktrace_ops *)0)->warning(NULL, NULL);
-],[
- AC_DEFINE(HAVE_STACKTRACE_WARNING, 1,
- [stacktrace_ops.warning is exist])
-])
-]) # LIBCFS_STACKTRACE_WARNING
-
-#
-# LC_SHRINKER_WANT_SHRINK_PTR
-#
-# RHEL6/2.6.32 want to have pointer to shrinker self pointer in handler function
-#
-AC_DEFUN([LC_SHRINKER_WANT_SHRINK_PTR], [
-LB_CHECK_COMPILE([if 'shrinker' want self pointer in handler],
-shrink_self_pointer, [
- #include <linux/mm.h>
-],[
- struct shrinker *tmp = NULL;
- tmp->shrink(tmp, 0, 0);
-],[
- AC_DEFINE(HAVE_SHRINKER_WANT_SHRINK_PTR, 1,
- [shrinker want self pointer in handler])
-])
-]) # LC_SHRINKER_WANT_SHRINK_PTR
-
-#
-# LIBCFS_SYSCTL_CTLNAME
-#
-# 2.6.33 no longer has ctl_name & strategy field in struct ctl_table.
-#
-AC_DEFUN([LIBCFS_SYSCTL_CTLNAME], [
-LB_CHECK_COMPILE([if 'ctl_table' has a 'ctl_name' field],
-ctl_table_ctl_name, [
- #include <linux/sysctl.h>
-],[
- struct ctl_table ct;
- ct.ctl_name = sizeof(ct);
-],[
- AC_DEFINE(HAVE_SYSCTL_CTLNAME, 1,
- [ctl_table has ctl_name field])
-])
-]) # LIBCFS_SYSCTL_CTLNAME
-
-#
-# LIBCFS_MODULE_LOCKING
-#
-# 2.6.36 introduced locking to module params. RHEL6 lacks this support
-#
-AC_DEFUN([LIBCFS_MODULE_LOCKING],[
-LB_CHECK_COMPILE([does the kernel support module param locking],
-module_param_locking, [
- #include <linux/moduleparam.h>
-],[
- __kernel_param_lock(NULL);
- __kernel_param_unlock(NULL);
-],[
- AC_DEFINE(HAVE_MODULE_PARAM_LOCKING, 1,
- [locking module param is supported])
-])
-]) # LIBCFS_MODULE_LOCKING
-
-#
-# LIBCFS_KSTRTOUL
-#
-# 2.6.38 kstrtoul is added
-#
-AC_DEFUN([LIBCFS_KSTRTOUL], [
-LB_CHECK_COMPILE([if Linux kernel has 'kstrtoul'],
-kstrtoul, [
- #include <linux/kernel.h>
-],[
- unsigned long result;
- return kstrtoul("12345", 0, &result);
-],[
- AC_DEFINE(HAVE_KSTRTOUL, 1,
- [kernel has kstrtoul])
-])
-]) # LIBCFS_KSTRTOUL
-
-#
-# LIBCFS_DUMP_TRACE_ADDRESS
-#
-# 2.6.39 adds a base pointer address argument to dump_trace
-#
-AC_DEFUN([LIBCFS_DUMP_TRACE_ADDRESS], [
-LB_CHECK_COMPILE([if 'dump_trace' want address],
-dump_trace_address, [
- struct task_struct;
- struct pt_regs;
- #include <asm/stacktrace.h>
-],[
- dump_trace(NULL, NULL, NULL, 0, NULL, NULL);
-],[
- AC_DEFINE(HAVE_DUMP_TRACE_ADDRESS, 1,
- [dump_trace want address argument])
-])
-]) # LIBCFS_DUMP_TRACE_ADDRESS
-
-#
-# LC_SHRINK_CONTROL
-#
-# FC15 2.6.40-5 backported the "shrink_control" parameter to the memory
-# pressure shrinker from Linux 3.0
-#
-AC_DEFUN([LC_SHRINK_CONTROL], [
-LB_CHECK_COMPILE([if 'shrink_control' is present],
-shrink_control, [
- #include <linux/atomic.h>
- #include <linux/mm.h>
-],[
- struct shrink_control tmp = {0};
- tmp.nr_to_scan = sizeof(tmp);
-],[
- AC_DEFINE(HAVE_SHRINK_CONTROL, 1,
- [shrink_control is present])
-])
-]) # LC_SHRINK_CONTROL
-
-#
-# LIBCFS_PROCESS_NAMESPACE
-#
-# 3.5 introduced process namespace
-AC_DEFUN([LIBCFS_PROCESS_NAMESPACE], [
-LB_CHECK_LINUX_HEADER([linux/uidgid.h], [
- AC_DEFINE(HAVE_UIDGID_HEADER, 1,
- [uidgid.h is present])])
-]) # LIBCFS_PROCESS_NAMESPACE
-
-#
-# LIBCFS_I_UID_READ
-#
-# 3.5 added helpers to read the new uid/gid types from VFS structures
-# SLE11 SP3 has uidgid.h but not the helpers
-#
-AC_DEFUN([LIBCFS_I_UID_READ], [
-LB_CHECK_COMPILE([if 'i_uid_read' is present],
-i_uid_read, [
- #include <linux/fs.h>
-],[
- i_uid_read(NULL);
-],[
- AC_DEFINE(HAVE_I_UID_READ, 1, [i_uid_read is present])
-])
-]) # LIBCFS_I_UID_READ
-
-#
-# LIBCFS_HAVE_CRC32
-#
-AC_DEFUN([LIBCFS_HAVE_CRC32], [
-LB_CHECK_CONFIG_IM([CRC32],
- [have_crc32="yes"], [have_crc32="no"])
-AS_IF([test "x$have_crc32" = xyes],
- [AC_DEFINE(HAVE_CRC32, 1,
- [kernel compiled with CRC32 functions])])
-]) # LIBCFS_HAVE_CRC32
-
-#
-# LIBCFS_ENABLE_CRC32_ACCEL
-#
-AC_DEFUN([LIBCFS_ENABLE_CRC32_ACCEL], [
-LB_CHECK_CONFIG_IM([CRYPTO_CRC32_PCLMUL],
- [enable_crc32_crypto="no"], [enable_crc32_crypto="yes"])
-AS_IF([test "x$have_crc32" = xyes -a "x$enable_crc32_crypto" = xyes], [
- AC_DEFINE(NEED_CRC32_ACCEL, 1, [need pclmulqdq based crc32])
- AC_MSG_WARN([No crc32 pclmulqdq crypto api found, enable internal pclmulqdq based crc32])])
-]) # LIBCFS_ENABLE_CRC32_ACCEL
-
-#
-# LIBCFS_ENABLE_CRC32C_ACCEL
-#
-AC_DEFUN([LIBCFS_ENABLE_CRC32C_ACCEL], [
-LB_CHECK_CONFIG_IM([CRYPTO_CRC32C_INTEL],
- [enable_crc32c_crypto="no"], [enable_crc32c_crypto="yes"])
-AS_IF([test "x$enable_crc32c_crypto" = xyes], [
- AC_DEFINE(NEED_CRC32C_ACCEL, 1, [need pclmulqdq based crc32c])
- AC_MSG_WARN([No crc32c pclmulqdq crypto api found, enable internal pclmulqdq based crc32c])])
-]) # LIBCFS_ENABLE_CRC32C_ACCEL
-
-#
# Kernel version 3.11 introduced ktime_get_ts64
#
AC_DEFUN([LIBCFS_KTIME_GET_TS64],[
]) # LIBCFS_SHRINKER_COUNT
#
+# Kernel version 3.13 commit aace05097a0fd467230e39acb148be0fdaa90068
+# add match_wildcard() function.
+#
+AC_DEFUN([LIBCFS_MATCH_WILDCARD],[
+LB_CHECK_COMPILE([does function 'match_wildcard' exist],
+match_wildcard, [
+ #include <linux/parser.h>
+],[
+ bool match;
+
+ match = match_wildcard(NULL, NULL);
+],[
+ AC_DEFINE(HAVE_MATCH_WILDCARD, 1,
+ [match_wildcard() is available])
+])
+]) # LIBCFS_MATCH_WILDCARD
+
+#
+# LIBCFS_HAVE_MAPPING_AS_EXITING_FLAG
+#
+# v3.14-7405-g91b0abe36a7b added AS_EXITING flag with
+# mapping_exiting() and mapping_set_exiting()
+#
+AC_DEFUN([LIBCFS_HAVE_MAPPING_AS_EXITING_FLAG], [
+m4_pattern_allow([AS_EXITING])
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if enum mapping_flags has AS_EXITING flag],
+mapping_exiting_exists, [
+ #include <linux/pagemap.h>
+],[
+ enum mapping_flags flag = AS_EXITING;
+ (void)flag;
+],[
+ AC_DEFINE(HAVE_MAPPING_AS_EXITING_FLAG, 1,
+ [enum mapping_flags has AS_EXITING flag])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_HAVE_MAPPING_AS_EXITING_FLAG
+
+#
# LIBCFS_IOV_ITER_HAS_TYPE
#
# kernel 3.15-rc4 commit 71d8e532b1549a478e6a6a8a44f309d050294d00
]) # LIBCFS_IOV_ITER_HAS_TYPE
#
+# LIBCFS_HAVE_NS_TO_TIMESPEC64
+#
+# Kernel version 4.16-rc3 commit a84d1169164b274f13b97a23ff235c000efe3b49
+# introduced struct __kernel_old_timeval
+#
+AC_DEFUN([LIBCFS_HAVE_NS_TO_TIMESPEC64],[
+LB_CHECK_COMPILE([does 'ns_to_timespec64()' exist],
+kernel_old_timeval, [
+ #include <linux/time.h>
+],[
+ struct timespec64 kts;
+
+ kts = ns_to_timespec64(0);
+],[
+ AC_DEFINE(HAVE_NS_TO_TIMESPEC64, 1,
+ [ns_to_timespec64() is available])
+])
+]) # LIBCFS_HAVE_NS_TO_TIMESPEC64
+
+#
# Kernel version 3.17 changed hlist_add_after to
# hlist_add_behind
#
]) # LIBCFS_KTIME_GET_SECONDS
#
+# Kernel version 3.19 commit v3.18-rc2-26-g61ada528dea0
+# introduce wait_woken()
+#
+AC_DEFUN([LIBCFS_WAIT_WOKEN],[
+LB_CHECK_COMPILE([does function 'wait_woken' exist],
+wait_woken, [
+ #include <linux/wait.h>
+],[
+ wait_woken(NULL, 0, 0);
+],[
+ AC_DEFINE(HAVE_WAIT_WOKEN, 1,
+ ['wait_woken, is available'])
+])
+]) # LIBCFS_WAIT_WOKEN
+
+#
# Kernel version 4.0 commit 41fbf3b39d5eca01527338b4d0ee15ee1ae1023c
# introduced the helper function ktime_ms_delta.
#
]) # LIBCFS_HAVE_TOPOLOGY_SIBLING_CPUMASK
#
-# Kernel version 4.2 commit df6b35f409af0a8ff1ef62f552b8402f3fef8665
-# header file i387.h was renamed to fpu/api.h
-#
-AC_DEFUN([LIBCFS_FPU_API], [
-LB_CHECK_LINUX_HEADER([asm/fpu/api.h], [
- AC_DEFINE(HAVE_FPU_API_HEADER, 1,
- [fpu/api.h is present])])
-]) # LIBCFS_FPU_API
-
-#
# Kernel version 4.4 commit ef951599074ba4fad2d0efa0a977129b41e6d203
# introduced kstrtobool and kstrtobool_from_user.
#
]) # LIBCFS_KSTRTOBOOL_FROM_USER
#
+# LIBCFS_NETLINK_CALLBACK_START
+#
+# Kernel version 4.4-rc3 commit fc9e50f5a5a4e1fa9ba2756f745a13e693cf6a06
+# added a start function callback for struct netlink_callback
+#
+AC_DEFUN([LIBCFS_NETLINK_CALLBACK_START], [
+LB_CHECK_COMPILE([if struct genl_ops has start callback],
+cb_start, [
+ #include <net/genetlink.h>
+],[
+ struct genl_ops ops;
+
+ ops.start = NULL;
+],[
+ AC_DEFINE(HAVE_NETLINK_CALLBACK_START, 1,
+ [struct genl_ops has 'start' callback])
+])
+]) # LIBCFS_NETLINK_CALLBACK_START
+
+#
# Kernel version 4.5-rc1 commit d12481bc58fba89427565f8592e88446ec084a24
# added crypto hash helpers
#
AC_DEFINE(HAVE_3ARG_RHASHTABLE_WALK_INIT, 1,
[rhashtable_walk_init() has 3 args])
])
-]) # LIBCFS_RHASHTABLE_REPLACE
+]) # LIBCFS_RHASHTABLE_WALK_INIT_3ARG
#
# Kernel version 4.8-rc6 commit ca26893f05e86497a86732768ec53cd38c0819ca
AC_DEFINE(HAVE_RHASHTABLE_WALK_ENTER, 1,
[rhashtable_walk_enter() is available])
])
-]) # LIBCFS_RHASHTABLE_REPLACE
+]) # LIBCFS_RHASHTABLE_WALK_ENTER
#
# Kernel version 4.9 commit 768ae309a96103ed02eb1e111e838c87854d8b51
# introduced refcount_t which is atomic_t plus over flow guards.
#
AC_DEFUN([LIBCFS_REFCOUNT_T], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
LB_CHECK_LINUX_HEADER([linux/refcount.h], [
AC_DEFINE(HAVE_REFCOUNT_T, 1,
- [refcount_t is supported])])
+ [refcount_t is supported])
+])
+EXTRA_KCFLAGS="$tmp_flags"
]) # LIBCFS_REFCOUNT_T
#
+# Kernel version 4.12 commit 499118e966f1d2150bd66647c8932343c4e9a0b8
+# introduce memalloc_noreclaim_{save,restore}
+#
+AC_DEFUN([LIBCFS_MEMALLOC_NORECLAIM], [
+LB_CHECK_COMPILE([if memalloc_noreclaim_{save,restore} exist],
+memalloc_noreclaim, [
+ #include <linux/sched/mm.h>
+],[
+ int flag = memalloc_noreclaim_save();
+ memalloc_noreclaim_restore(flag);
+],[
+ AC_DEFINE(HAVE_MEMALLOC_RECLAIM, 1,
+ [memalloc_noreclaim_{save,restore}() is supported])
+])
+]) # LIBCFS_MEMALLOC_NORECLAIM
+
+#
# LIBCFS_SCHED_HEADERS
#
# 4.11 has broken up sched.h into more headers.
]) # LIBCFS_SCHED_HEADERS
#
+# Kernel version 4.11-rc1 commit 2c935bc57221cc2edc787c72ea0e2d30cdcd3d5e
+# introduce kref_read
+#
+AC_DEFUN([LIBCFS_KREF_READ], [
+LB_CHECK_COMPILE([if 'kref_read' exists],
+kref_read, [
+ #include <linux/kref.h>
+],[
+ kref_read(NULL);
+],[
+ AC_DEFINE(HAVE_KREF_READ, 1,
+ [kref_read() is available])
+])
+]) # LIBCFS_KREF_READ
+
+#
# Kernel version 4.11-rc1 commit da20420f83ea0fbcf3d03afda08d971ea1d8a356
# introduced rht_bucket_var
#
]) # LIBCFS_RHT_BUCKET_VAR
#
+# Kernel version 4.11-rc5 commit fceb6435e85298f747fee938415057af837f5a8a
+# began the enhanchement of Netlink with extended ACK struct for advanced
+# error handling. By commit 7ab606d1609dd6dfeae9c8ad0a8a4e051d831e46 we
+# had full support for this new feature.
+#
+AC_DEFUN([LIBCFS_NL_EXT_ACK], [
+LB_CHECK_COMPILE([if Netlink supports netlink_ext_ack],
+netlink_ext_ack, [
+ #include <net/genetlink.h>
+],[
+ struct genl_info info;
+
+ info.extack = NULL;
+],[
+ AC_DEFINE(HAVE_NL_PARSE_WITH_EXT_ACK, 1,
+ [netlink_ext_ack is an argument to nla_parse type function])
+])
+]) # LIBCFS_NL_EXT_ACK
+
+#
# Kernel version 4.11 commit f9fe1c12d126f9887441fa5bb165046f30ddd4b5
# introduced rhashtable_lookup_get_insert_fast
#
]) # LIBCFS_RHASHTABLE_LOOKUP_GET_INSERT_FAST
#
+# Kernel version 4.12-rc2 8f553c498e1772cccb39a114da4a498d22992758
+# provide proper CPU hotplug locking
+#
+AC_DEFUN([LIBCFS_CPUS_READ_LOCK], [
+LB_CHECK_COMPILE([if 'cpus_read_[un]lock' exist],
+cpu_read_lock, [
+ #include <linux/cpu.h>
+],[
+ cpus_read_lock();
+ cpus_read_unlock();
+],[
+ AC_DEFINE(HAVE_CPUS_READ_LOCK, 1, ['cpus_read_lock' exist])
+])
+]) # LIBCFS_CPUS_READ_LOCK
+
+#
# Kernel version 4.12-rc3 f9727a17db9bab71ddae91f74f11a8a2f9a0ece6
# renamed uuid_be to uuid_t
#
# introduce processor.h
#
AC_DEFUN([LIBCFS_HAVE_PROCESSOR_HEADER], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
LB_CHECK_LINUX_HEADER([linux/processor.h], [
AC_DEFINE(HAVE_PROCESSOR_H, 1,
- [processor.h is present])])
+ [processor.h is present])
+])
+EXTRA_KCFLAGS="$tmp_flags"
]) # LIBCFS_HAVE_PROCESSOR_HEADER
#
]) # LIBCFS_WAIT_QUEUE_TASK_LIST_RENAME
#
+# LIBCFS_WAIT_BIT_QUEUE_ENTRY_EXISTS
+#
+# Kernel version v4.12-rc6-23-g76c85ddc4695
+# sched/wait: Standardize wait_bit_queue naming
+#
+# renamed struct wait_bit_queue => wait_bit_queue_entry
+#
+AC_DEFUN([LIBCFS_WAIT_BIT_QUEUE_ENTRY_EXISTS], [
+LB_CHECK_COMPILE([if struct wait_bit_queue_entry exists],
+struct_wait_bit_queue_entry_exists, [
+ #include <linux/wait.h>
+ #if HAVE_WAIT_BIT_HEADER_H
+ #include <linux/wait_bit.h>
+ #endif
+],[
+ struct wait_bit_queue_entry entry;
+ memset(&entry, 0, sizeof(entry));
+],[
+ AC_DEFINE(HAVE_WAIT_BIT_QUEUE_ENTRY, 1,
+ [if struct wait_bit_queue_entry exists])
+])
+]) # LIBCFS_WAIT_BIT_QUEUE_ENTRY_EXISTS
+
+#
+# LIBCFS_NLA_STRDUP
+#
+# Kernel version 4.13-rc1 commit 2cf0c8b3e6942ecafe6ebb1a6d0328a81641bf39
+# created nla_strdup(). This is needed since push strings can be
+# any size.
+#
+AC_DEFUN([LIBCFS_NLA_STRDUP], [
+LB_CHECK_COMPILE([if 'nla_strdup()' exists],
+nla_strdup, [
+ #include <net/netlink.h>
+],[
+ char *tmp = nla_strdup(NULL, GFP_KERNEL);
+],[
+ AC_DEFINE(HAVE_NLA_STRDUP, 1,
+ ['nla_strdup' is available])
+])
+]) # LIBCFS_NLA_STRDUP
+
+#
# LIBCFS_WAIT_QUEUE_ENTRY
#
# Kernel version 4.13 ac6424b981bce1c4bc55675c6ce11bfe1bbfa64f
]) # LIBCFS_MM_TOTALRAM_PAGES_FUNC
#
-# LIBCFS_NEW_KERNEL_WRITE
+# LIBCFS_NEW_KERNEL_READ
#
# 4.14 commit bdd1d2d3d251c65b74ac4493e08db18971c09240 changed
# the signature of kernel_read to match other read/write helpers
]) # LIBCFS_EXPORT_SAVE_STACK_TRACE_TSK
#
+# LIBCFS_LOCKDEP_IS_HELD
+#
+# Kernel v4.15-rc8-106-g08f36ff64234
+# lockdep: Make lockdep checking constant
+#
+AC_DEFUN([LIBCFS_LOCKDEP_IS_HELD], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'lockdep_is_held()' uses const argument],
+lockdep_is_held, [
+ #include <linux/lockdep.h>
+],[
+#ifdef CONFIG_LOCKDEP
+ const struct spinlock *lock = NULL;
+
+ lockdep_is_held(lock);
+#endif
+],[],[
+ AC_DEFINE(NEED_LOCKDEP_IS_HELD_DISCARD_CONST, 1,
+ [lockdep_is_held() argument is const])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_LOCKDEP_IS_HELD
+
+#
# LIBCFS_TIMER_SETUP
#
# Kernel version 4.15 commit e99e88a9d2b067465adaa9c111ada99a041bef9a
]) # LIBCFS_WAIT_VAR_EVENT
#
+# LIBCFS_BITMAP_ALLOC
+#
+# Kernel version 4.17 commit c42b65e363ce97a828f81b59033c3558f8fa7f70
+# added bitmap memory allocation handling.
+#
+AC_DEFUN([LIBCFS_BITMAP_ALLOC], [
+LB_CHECK_COMPILE([if Linux bitmap memory management exist],
+bitmap_alloc, [
+ #include <linux/bitmap.h>
+],[
+ unsigned long *map = bitmap_alloc(1, GFP_KERNEL);
+],[
+ AC_DEFINE(HAVE_BITMAP_ALLOC, 1,
+ [Linux bitmap can be allocated])
+])
+]) # LIBCFS_BITMAP_ALLOC
+
+#
# LIBCFS_CLEAR_AND_WAKE_UP_BIT
#
# Kernel version 4.17-rc2 commit 8236b0ae31c837d2b3a2565c5f8d77f637e824cc
]) # LIBCFS_CLEAR_AND_WAKE_UP_BIT
#
+# LIBCFS_TCP_SOCK_SET_NODELAY
+#
+# kernel 4.18.0-293.el8
+# tcp_sock_set_nodelay() was added
+AC_DEFUN([LIBCFS_TCP_SOCK_SET_NODELAY], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'tcp_sock_set_nodelay()' exists],
+tcp_sock_set_nodelay_exists, [
+ #include <linux/tcp.h>
+],[
+ tcp_sock_set_nodelay(NULL);
+],[
+ AC_DEFINE(HAVE_TCP_SOCK_SET_NODELAY, 1,
+ ['tcp_sock_set_nodelay()' exists])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_TCP_SOCK_SET_NODELAY
+
+#
+# LIBCFS_TCP_SOCK_SET_KEEPIDLE
+#
+# kernel 4.18.0-293.el8
+# tcp_sock_set_keepidle() was added
+AC_DEFUN([LIBCFS_TCP_SOCK_SET_KEEPIDLE], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'tcp_sock_set_keepidle()' exists],
+tcp_sock_set_keepidle_exists, [
+ #include <linux/tcp.h>
+],[
+ tcp_sock_set_keepidle(NULL, 0);
+],[
+ AC_DEFINE(HAVE_TCP_SOCK_SET_KEEPIDLE, 1,
+ ['tcp_sock_set_keepidle()' exists])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_TCP_SOCK_SET_KEEPIDLE
+
+#
+# LIBCFS_TCP_SOCK_SET_QUICKACK
+# kernel v5.7-rc6-2504-gddd061b8daed
+# tcp: add tcp_sock_set_quickack
+#
+AC_DEFUN([LIBCFS_TCP_SOCK_SET_QUICKACK], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'tcp_sock_set_quickack()' exists],
+tcp_sock_set_quickack_exists, [
+ #include <linux/tcp.h>
+],[
+ tcp_sock_set_quickack(NULL, 0);
+],[
+ AC_DEFINE(HAVE_TCP_SOCK_SET_QUICKACK, 1,
+ ['tcp_sock_set_quickack()' exists])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_TCP_SOCK_SET_QUICKACK
+
+#
+# LIBCFS_TCP_SOCK_SET_KEEPINTVL
+# v5.7-rc6-2508-gd41ecaac903c
+# tcp: add tcp_sock_set_keepintvl
+#
+AC_DEFUN([LIBCFS_TCP_SOCK_SET_KEEPINTVL], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'tcp_sock_set_keepintvl()' exists],
+tcp_sock_set_keepintvl_exists, [
+ #include <linux/tcp.h>
+],[
+ tcp_sock_set_keepintvl(NULL, 0);
+],[
+ AC_DEFINE(HAVE_TCP_SOCK_SET_KEEPINTVL, 1,
+ ['tcp_sock_set_keepintvl()' exists])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_TCP_SOCK_SET_KEEPINTVL
+
+#
+# LIBCFS_TCP_SOCK_SET_KEEPCNT
+# v5.7-rc6-2509-g480aeb9639d6
+# tcp: add tcp_sock_set_keepcnt
+#
+AC_DEFUN([LIBCFS_TCP_SOCK_SET_KEEPCNT], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'tcp_sock_set_keepcnt()' exists],
+tcp_sock_set_keepcnt_exists, [
+ #include <linux/tcp.h>
+],[
+ tcp_sock_set_keepcnt(NULL, 0);
+],[
+ AC_DEFINE(HAVE_TCP_SOCK_SET_KEEPCNT, 1,
+ ['tcp_sock_set_keepcnt()' exists])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_TCP_SOCK_SET_KEEPCNT
+
+#
+# LIBCFS_XARRAY_SUPPORT
+#
+# 4.19-rc5 kernel commit 3159f943aafdbacb2f94c38fdaadabf2bbde2a14
+# replaced the radix tree implementation with Xarrays. This change
+# introduced functionaly needed for general Xarray support
+#
+AC_DEFUN([LIBCFS_XARRAY_SUPPORT], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if page cache uses Xarray],
+xarray_support, [
+ #include <linux/xarray.h>
+],[
+ xa_is_value(NULL);
+],[
+ AC_DEFINE(HAVE_XARRAY_SUPPORT, 1,
+ [kernel Xarray implementation lacks 'xa_is_value'])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_XARRAY_SUPPORT
+
+#
+# Kernel version 4.19-rc6 commit 4a19edb60d0203cd5bf95a8b46ea8f63fd41194c
+# added extended ACK handling to Netlink dump handlers
+#
+AC_DEFUN([LIBCFS_NL_DUMP_EXT_ACK], [
+LB_CHECK_COMPILE([if Netlink dump handlers support ext_ack],
+netlink_dump_ext_ack, [
+ #include <net/netlink.h>
+],[
+ struct netlink_callback *cb = NULL;
+ cb->extack = NULL;
+],[
+ AC_DEFINE(HAVE_NL_DUMP_WITH_EXT_ACK, 1,
+ [netlink_ext_ack is handled for Netlink dump handlers])
+])
+]) # LIBCFS_NL_DUMP_EXT_ACK
+
+#
# LIBCFS_HAVE_IOV_ITER_TYPE
#
# kernel 4.20 commit 00e23707442a75b404392cef1405ab4fd498de6b
]) # LIBCFS_HAVE_IOV_ITER_TYPE
#
+# LIBCFS_GET_REQUEST_KEY_AUTH
+#
+# kernel 5.0 commit 822ad64d7e46a8e2c8b8a796738d7b657cbb146d
+# keys: Fix dependency loop between construction record and auth key
+#
+# Added <keys/request_key_auth-type.h> and get_request_key_auth()
+# which was propagated to stable
+#
+AC_DEFUN([LIBCFS_GET_REQUEST_KEY_AUTH], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if get_request_key_auth() is available],
+get_request_key_auth_exported, [
+ #include <linux/key.h>
+ #include <linux/keyctl.h>
+ #include <keys/request_key_auth-type.h>
+],[
+ struct key *ring;
+ const struct key *key = NULL;
+ struct request_key_auth *rka = get_request_key_auth(key);
+
+ ring = key_get(rka->dest_keyring);
+],[
+ AC_DEFINE(HAVE_GET_REQUEST_KEY_AUTH, 1,
+ [get_request_key_auth() is available])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_GET_REQUEST_KEY_AUTH
+
+#
+# LIBCFS_LOOKUP_USER_KEY
+#
+# kernel 5.3 commit 3cf5d076fb4d48979f382bc9452765bf8b79e740
+# signal: Remove task parameter from force_sig
+#
+AC_DEFUN([LIBCFS_LOOKUP_USER_KEY], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if lookup_user_key() is available],
+lookup_user_key_exported, [
+ #include <linux/key.h>
+ #include <linux/keyctl.h>
+],[
+ lookup_user_key(KEY_SPEC_USER_KEYRING, 0, 0);
+],[
+ AC_DEFINE(HAVE_LOOKUP_USER_KEY, 1,
+ [lookup_user_key() is available])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_LOOKUP_USER_KEY
+
+#
# LIBCFS_FORCE_SIG_WITH_TASK
#
# kernel 5.3 commit 3cf5d076fb4d48979f382bc9452765bf8b79e740
]) # LIBCFS_FORCE_SIG_WITH_TASK
#
+# LIBCFS_CACHE_DETAIL_WRITERS
+#
+# kernel v5.3-rc2-1-g64a38e840ce5
+# SUNRPC: Track writers of the 'channel' file to improve cache_listeners_exist
+#
+AC_DEFUN([LIBCFS_CACHE_DETAIL_WRITERS], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if struct cache_detail has writers],
+cache_detail_writers_atomic, [
+ #include <linux/sunrpc/cache.h>
+
+ static struct cache_detail rsi_cache;
+],[
+ atomic_set(&rsi_cache.writers, 0);
+],[
+ AC_DEFINE(HAVE_CACHE_DETAIL_WRITERS, 1,
+ [struct cache_detail has writers])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_CACHE_DETAIL_WRITERS
+
+#
+# LIBCFS_KALLSYMS_LOOKUP
+#
+# kernel v5.6-11591-g0bd476e6c671
+# kallsyms: unexport kallsyms_lookup_name() and kallsyms_on_each_symbol()
+AC_DEFUN([LIBCFS_KALLSYMS_LOOKUP], [
+LB_CHECK_EXPORT([kallsyms_lookup_name], [kernel/kallsyms.c],
+ [AC_DEFINE(HAVE_KALLSYMS_LOOKUP_NAME, 1,
+ [kallsyms_lookup_name is exported by kernel])])
+]) # LIBCFS_KALLSYMS_LOOKUP
+
+#
+# v5.5-8862-gd56c0d45f0e2
+# proc: decouple proc from VFS with "struct proc_ops"
+#
+AC_DEFUN([LIBCFS_SRC_HAVE_PROC_OPS], [
+ LB2_LINUX_TEST_SRC([proc_ops], [
+ #include <linux/proc_fs.h>
+
+ static struct proc_ops *my_proc;
+ ],[
+ my_proc->proc_lseek = NULL;
+ ],[-Werror])
+]) # LIBCFS_SRC_HAVE_PROC_OPS
+AC_DEFUN([LIBCFS_HAVE_PROC_OPS], [
+ AC_MSG_CHECKING([if struct proc_ops exists])
+ LB2_LINUX_TEST_RESULT([proc_ops], [
+ AC_DEFINE(HAVE_PROC_OPS, 1,
+ [struct proc_ops exists])
+ AC_MSG_RESULT(yes)
+ ],[
+ AC_MSG_RESULT(no)
+ ])
+]) # LIBCFS_HAVE_PROC_OPS
+
+#
+# LIBCFS_VMALLOC_2ARGS
+#
+# kernel v5.8-rc1~201^2~19
+# mm: remove the pgprot argument to __vmalloc
+AC_DEFUN([LIBCFS_VMALLOC_2ARGS], [
+LB_CHECK_COMPILE([if __vmalloc has 2 args],
+vmalloc_2args, [
+ #include <linux/vmalloc.h>
+],[
+ __vmalloc(0, 0);
+],[
+ AC_DEFINE(HAVE_VMALLOC_2ARGS, 1,
+ [__vmalloc only takes 2 args.])
+])
+]) # LIBCFS_VMALLOC_2ARGS
+
+#
+# LIBCFS_HAVE_NR_UNSTABLE_NFS
+#
+# kernel v5.8-rc1~201^2~75
+# mm/writeback: discard NR_UNSTABLE_NFS, use NR_WRITEBACK instead
+#
+AC_DEFUN([LIBCFS_HAVE_NR_UNSTABLE_NFS], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if NR_UNSTABLE_NFS still in use],
+nr_unstable_nfs_exists, [
+ #include <linux/mm.h>
+
+ int i;
+],[
+ i = NR_UNSTABLE_NFS;
+],[
+ AC_DEFINE(HAVE_NR_UNSTABLE_NFS, 1,
+ [NR_UNSTABLE_NFS is still in use.])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_HAVE_NR_UNSTABLE_NFS
+
+#
+# LIBCFS_HAVE_MMAP_LOCK
+#
+# kernel v5.8-rc1~83^2~24
+# mmap locking API: rename mmap_sem to mmap_lock
+#
+AC_DEFUN([LIBCFS_HAVE_MMAP_LOCK], [
+LB_CHECK_COMPILE([if mmap_lock API is available],
+mmap_write_lock, [
+ #include <linux/mm.h>
+],[
+ mmap_write_lock(NULL);
+],[
+ AC_DEFINE(HAVE_MMAP_LOCK, 1,
+ [mmap_lock API is available.])
+])
+]) # LIBCFS_HAVE_MMAP_LOCK
+
+#
+# LIBCFS_KERNEL_SETSOCKOPT
+#
+# kernel v5.8-rc1~165^2~59^2
+# net: remove kernel_setsockopt
+AC_DEFUN([LIBCFS_KERNEL_SETSOCKOPT], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if kernel_setsockopt still in use],
+kernel_setsockopt_exists, [
+ #include <linux/net.h>
+],[
+ kernel_setsockopt(NULL, 0, 0, NULL, 0);
+],[
+ AC_DEFINE(HAVE_KERNEL_SETSOCKOPT, 1,
+ [kernel_setsockopt still in use])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_KERNEL_SETSOCKOPT
+
+#
+# LIBCFS_SEC_RELEASE_SECCTX
+#
+# kernel linux-hwe-5.8 (5.8.0-22.23~20.04.1)
+# LSM: Use lsmcontext in security_release_secctx
+AC_DEFUN([LIBCFS_SEC_RELEASE_SECCTX], [
+LB_CHECK_COMPILE([if security_release_secctx has 1 arg],
+security_release_secctx_1arg, [
+ #include <linux/security.h>
+],[
+ security_release_secctx(NULL);
+],[
+ AC_DEFINE(HAVE_SEC_RELEASE_SECCTX_1ARG, 1,
+ [security_release_secctx has 1 arg.])
+])
+]) # LIBCFS_SEC_RELEASE_SECCTX
+
+#
+# LIBCFS_HAVE_KFREE_SENSITIVE
+#
+# kernel v5.10-rc1~3
+# mm: remove kzfree() compatibility definition
+#
+AC_DEFUN([LIBCFS_HAVE_KFREE_SENSITIVE], [
+LB_CHECK_COMPILE([if kfree_sensitive() is available],
+kfree_sensitive_exists, [
+ #include <linux/slab.h>
+
+],[
+ kfree_sensitive(NULL);
+],[
+ AC_DEFINE(HAVE_KFREE_SENSITIVE, 1,
+ [kfree_sensitive() is available.])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_HAVE_KFREE_SENSITIVE
+
+#
+# LIBCFS_HAVE_CRYPTO_SHA2_HEADER
+#
+# Kernel v5.10-rc1-114-ga24d22b225ce
+# crypto: sha - split sha.h into sha1.h and sha2.h
+#
+AC_DEFUN([LIBCFS_HAVE_CRYPTO_SHA2_HEADER], [
+LB_CHECK_LINUX_HEADER([crypto/sha2.h], [
+ AC_DEFINE(HAVE_CRYPTO_SHA2_HEADER, 1,
+ [crypto/sha2.h is present])])
+]) # LIBCFS_HAVE_CRYPTO_SHA2_HEADER
+
+#
+# LIBCFS_HAVE_LIST_CMP_FUNC_T
+#
+# kernel 5.10.70 commit 4f0f586bf0c898233d8f316f471a21db2abd522d
+# treewide: Change list_sort to use const pointers
+AC_DEFUN([LIBCFS_HAVE_LIST_CMP_FUNC_T], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror -Wno-unused-variable"
+LB_CHECK_COMPILE([if list_cmp_func_t type is defined],
+list_cmp_func_t, [
+ #include <linux/list_sort.h>
+],[
+ list_cmp_func_t cmp;
+],[
+ AC_DEFINE(HAVE_LIST_CMP_FUNC_T, 1,
+ [list_cmp_func_t type is defined])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LIBCFS_HAVE_LIST_CMP_FUNC_T
+
+AC_DEFUN([LIBCFS_PROG_LINUX_SRC], [
+ LIBCFS_SRC_HAVE_PROC_OPS
+
+ AC_MSG_CHECKING([for available kernel interfaces to libcfs])
+ LB2_LINUX_TEST_COMPILE_ALL([libcfs])
+ AC_MSG_RESULT([done])
+])
+AC_DEFUN([LIBCFS_PROG_LINUX_RESULTS], [
+ # 5.6
+ LIBCFS_HAVE_PROC_OPS
+])
+
+#
+# LIBCFS_PARAM_SET_UINT_MINMAX
+#
+# Kernel 5.15-rc1 commit 2a14c9ae15a38148484a128b84bff7e9ffd90d68
+# moved param_set_uint_minmax to common code
+#
+AC_DEFUN([LIBCFS_PARAM_SET_UINT_MINMAX],[
+LB_CHECK_COMPILE([does function 'param_set_uint_minmax' exist],
+param_set_uint_minmax, [
+ #include <linux/moduleparam.h>
+],[
+ param_set_uint_minmax(NULL, NULL, 0, 0);
+],[
+ AC_DEFINE(HAVE_PARAM_SET_UINT_MINMAX, 1,
+ ['param_set_uint_minmax' is available])
+])
+]) # LIBCFS_PARAM_SET_UINT_MINMAX
+
+#
# LIBCFS_PROG_LINUX
#
# LibCFS linux kernel checks
==============================================================================])
LIBCFS_CONFIG_PANIC_DUMPLOG
-# 2.6.32
-LIBCFS_STACKTRACE_OPS_HAVE_WALK_STACK
-LC_SHRINKER_WANT_SHRINK_PTR
-# 2.6.33
-LIBCFS_SYSCTL_CTLNAME
-# 2.6.36
-LIBCFS_MODULE_LOCKING
-# 2.6.38
-LIBCFS_KSTRTOUL
-# 2.6.39
-LIBCFS_DUMP_TRACE_ADDRESS
-# 2.6.40 fc15
-LC_SHRINK_CONTROL
-# 3.0
-LIBCFS_STACKTRACE_WARNING
-# 3.5
-LIBCFS_PROCESS_NAMESPACE
-LIBCFS_I_UID_READ
-# 3.8
-LIBCFS_HAVE_CRC32
-LIBCFS_ENABLE_CRC32_ACCEL
-# 3.10
-LIBCFS_ENABLE_CRC32C_ACCEL
# 3.11
LIBCFS_KTIME_GET_TS64
# 3.12
LIBCFS_KTIME_BEFORE
LIBCFS_KTIME_COMPARE
LIBCFS_SHRINKER_COUNT
+# 3.13
+LIBCFS_MATCH_WILDCARD
# 3.15
+LIBCFS_HAVE_MAPPING_AS_EXITING_FLAG
LIBCFS_IOV_ITER_HAS_TYPE
+# 3.16
+LIBCFS_HAVE_NS_TO_TIMESPEC64
# 3.17
LIBCFS_HLIST_ADD_AFTER
LIBCFS_TIMESPEC64
LIBCFS_TIMESPEC64_TO_KTIME
# 3.19
LIBCFS_KTIME_GET_SECONDS
+LIBCFS_WAIT_WOKEN
# 4.0
LIBCFS_KTIME_MS_DELTA
# 4.1
LIBCFS_KERNEL_PARAM_LOCK
# 4.2
LIBCFS_HAVE_TOPOLOGY_SIBLING_CPUMASK
-LIBCFS_FPU_API
# 4.4
LIBCFS_KSTRTOBOOL_FROM_USER
+LIBCFS_NETLINK_CALLBACK_START
# 4.5
LIBCFS_CRYPTO_HASH_HELPERS
LIBCFS_EXPORT_KSET_FIND_OBJ
# 4.11
LIBCFS_RHASHTABLE_LOOKUP_GET_INSERT_FAST
LIBCFS_SCHED_HEADERS
+LIBCFS_KREF_READ
LIBCFS_RHT_BUCKET_VAR
# 4.12
LIBCFS_HAVE_PROCESSOR_HEADER
LIBCFS_HAVE_WAIT_BIT_HEADER
+LIBCFS_MEMALLOC_NORECLAIM
+LIBCFS_NL_EXT_ACK
LIBCFS_WAIT_QUEUE_TASK_LIST_RENAME
+LIBCFS_CPUS_READ_LOCK
LIBCFS_UUID_T
# 4.13
+LIBCFS_NLA_STRDUP
LIBCFS_WAIT_QUEUE_ENTRY
+LIBCFS_WAIT_BIT_QUEUE_ENTRY_EXISTS
# 4.14
LIBCFS_DEFINE_TIMER
LIBCFS_NEW_KERNEL_WRITE
LIBCFS_NEW_KERNEL_READ
LIBCFS_EXPORT_SAVE_STACK_TRACE_TSK
# 4.15
+LIBCFS_LOCKDEP_IS_HELD
LIBCFS_TIMER_SETUP
# 4.16
LIBCFS_WAIT_VAR_EVENT
# 4.17
+LIBCFS_BITMAP_ALLOC
LIBCFS_CLEAR_AND_WAKE_UP_BIT
+# 4.18
+LIBCFS_TCP_SOCK_SET_NODELAY
+LIBCFS_TCP_SOCK_SET_KEEPIDLE
+# 4.19
+LIBCFS_XARRAY_SUPPORT
+LIBCFS_NL_DUMP_EXT_ACK
# 4.20
LIBCFS_HAVE_IOV_ITER_TYPE
# 5.0
LIBCFS_MM_TOTALRAM_PAGES_FUNC
+LIBCFS_GET_REQUEST_KEY_AUTH
# 5.3
+LIBCFS_LOOKUP_USER_KEY
LIBCFS_FORCE_SIG_WITH_TASK
+LIBCFS_CACHE_DETAIL_WRITERS
+LIBCFS_HAVE_NR_UNSTABLE_NFS
+# 5.7
+LIBCFS_KALLSYMS_LOOKUP
+LIBCFS_TCP_SOCK_SET_QUICKACK
+LIBCFS_TCP_SOCK_SET_KEEPINTVL
+LIBCFS_TCP_SOCK_SET_KEEPCNT
+# 5.8
+LIBCFS_HAVE_MMAP_LOCK
+LIBCFS_KERNEL_SETSOCKOPT
+LIBCFS_VMALLOC_2ARGS
+LIBCFS_SEC_RELEASE_SECCTX
+# 5.10
+LIBCFS_HAVE_KFREE_SENSITIVE
+LIBCFS_HAVE_CRYPTO_SHA2_HEADER
+LIBCFS_HAVE_LIST_CMP_FUNC_T
+# 5.15
+LIBCFS_PARAM_SET_UINT_MINMAX
]) # LIBCFS_PROG_LINUX
#
]) # LIBCFS_CONFIGURE
#
-# LIBCFS_CONDITIONALS
-#
-AC_DEFUN([LIBCFS_CONDITIONALS], [
-AM_CONDITIONAL(HAVE_CRC32, [test "x$have_crc32" = xyes])
-AM_CONDITIONAL(NEED_PCLMULQDQ_CRC32, [test "x$have_crc32" = xyes -a "x$enable_crc32_crypto" = xyes])
-AM_CONDITIONAL(NEED_PCLMULQDQ_CRC32C, [test "x$enable_crc32c_crypto" = xyes])
-]) # LIBCFS_CONDITIONALS
-
-#
# LIBCFS_CONFIG_FILES
#
# files that should be generated with AC_OUTPUT
libcfs/autoconf/Makefile
libcfs/include/Makefile
libcfs/include/libcfs/Makefile
+libcfs/include/uapi/Makefile
libcfs/include/libcfs/linux/Makefile
libcfs/include/libcfs/util/Makefile
+libcfs/include/libcfs/crypto/Makefile
+libcfs/include/uapi/linux/Makefile
libcfs/libcfs/Makefile
libcfs/libcfs/autoMakefile
libcfs/libcfs/linux/Makefile
libcfs/libcfs/util/Makefile
+libcfs/libcfs/crypto/Makefile
])
]) # LIBCFS_CONFIG_FILES