Skip to content
Snippets Groups Projects
Select Git revision
  • af2d861d4cd2a4da5137f795ee3509e6f944a25b
  • apu_kernel default
  • mesh_mac_filter
  • wiptp_patch
  • master protected
  • v6.7-rc6
  • v6.7-rc5
  • v6.7-rc4
  • v6.7-rc3
  • v6.7-rc2
  • v6.7-rc1
  • v6.6
  • v6.6-rc7
  • v6.6-rc6
  • v6.6-rc5
  • v6.6-rc4
  • v6.6-rc3
  • v6.6-rc2
  • v6.6-rc1
  • v6.5
  • v6.5-rc7
  • v6.5-rc6
  • v6.5-rc5
  • v6.5-rc4
  • v6.5-rc3
25 results

rfkill

  • Clone with SSH
  • Clone with HTTPS
  • user avatar
    Johannes Berg authored and Kalle Valo committed
    Again new complaints surfaced that we had broken the ABI here,
    although previously all the userspace tools had agreed that it
    was their mistake and fixed it. Yet now there are cases (e.g.
    RHEL) that want to run old userspace with newer kernels, and
    thus are broken.
    
    Since this is a bit of a whack-a-mole thing, change the whole
    extensibility scheme of rfkill to no longer just rely on the
    message lengths, but instead require userspace to opt in via a
    new ioctl to a given maximum event size that it is willing to
    understand.
    
    By default, set that to RFKILL_EVENT_SIZE_V1 (8), so that the
    behaviour for userspace not calling the ioctl will look as if
    it's just running on an older kernel.
    
    Fixes: 14486c82 ("rfkill: add a reason to the HW rfkill state")
    Cc: stable@vger.kernel.org # 5.11+
    Signed-off-by: default avatarJohannes Berg <johannes.berg@intel.com>
    Signed-off-by: default avatarKalle Valo <kvalo@kernel.org>
    Link: https://lore.kernel.org/r/20220316212749.16491491b270.Ifcb1950998330a596f29a2a162e00b7546a1d6d0@changeid
    54f586a9
    History
    Name Last commit Last update
    ..