+ revert-x86_64-mm-twofish-cipher---x86_64-assembler.patch added to -mm tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The patch titled

     revert x86_64-mm-twofish-cipher---x86_64-assembler

has been added to the -mm tree.  Its filename is

     revert-x86_64-mm-twofish-cipher---x86_64-assembler.patch

See http://www.zip.com.au/~akpm/linux/patches/stuff/added-to-mm.txt to find
out what to do about this

------------------------------------------------------
Subject: revert x86_64-mm-twofish-cipher---x86_64-assembler
From: Andrew Morton <akpm@xxxxxxxx>


Signed-off-by: Andrew Morton <akpm@xxxxxxxx>
---

 arch/x86_64/crypto/Makefile             |    3 
 arch/x86_64/crypto/twofish-x86_64-asm.S |  406 ----------------------
 arch/x86_64/crypto/twofish.c            |   86 ----
 crypto/Kconfig                          |   14 
 4 files changed, 509 deletions(-)

diff -puN arch/x86_64/crypto/Makefile~revert-x86_64-mm-twofish-cipher---x86_64-assembler arch/x86_64/crypto/Makefile
--- a/arch/x86_64/crypto/Makefile~revert-x86_64-mm-twofish-cipher---x86_64-assembler
+++ a/arch/x86_64/crypto/Makefile
@@ -5,8 +5,5 @@
 # 
 
 obj-$(CONFIG_CRYPTO_AES_X86_64) += aes-x86_64.o
-obj-$(CONFIG_CRYPTO_TWOFISH_X86_64) += twofish-x86_64.o
 
 aes-x86_64-y := aes-x86_64-asm.o aes.o
-twofish-x86_64-y := twofish-x86_64-asm.o twofish.o ../../../crypto/twofish_common.o
-
diff -puN arch/x86_64/crypto/twofish.c~revert-x86_64-mm-twofish-cipher---x86_64-assembler /dev/null
--- a/arch/x86_64/crypto/twofish.c
+++ /dev/null
@@ -1,86 +0,0 @@
-/*
- * Glue Code for optimized x86_64 assembler version of TWOFISH
- *
- * Originally Twofish for GPG
- * By Matthew Skala <mskala@xxxxxxxxxxxxxxxxx>, July 26, 1998
- * 256-bit key length added March 20, 1999
- * Some modifications to reduce the text size by Werner Koch, April, 1998
- * Ported to the kerneli patch by Marc Mutz <Marc@xxxxxxxx>
- * Ported to CryptoAPI by Colin Slater <hoho@xxxxxxxxxxxx>
- *
- * The original author has disclaimed all copyright interest in this
- * code and thus put it in the public domain. The subsequent authors
- * have put this under the GNU General Public License.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307
- * USA
- *
- * This code is a "clean room" implementation, written from the paper
- * _Twofish: A 128-Bit Block Cipher_ by Bruce Schneier, John Kelsey,
- * Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson, available
- * through http://www.counterpane.com/twofish.html
- *
- * For background information on multiplication in finite fields, used for
- * the matrix operations in the key schedule, see the book _Contemporary
- * Abstract Algebra_ by Joseph A. Gallian, especially chapter 22 in the
- * Third Edition.
- */
-
-#include <asm/byteorder.h>
-#include <linux/module.h>
-#include <linux/init.h>
-#include <linux/types.h>
-#include <linux/errno.h>
-#include <linux/crypto.h>
-#include <linux/bitops.h>
-#include <crypto/twofish.h>
-
-asmlinkage void twofish_enc_blk(void *ctx, u8 *dst, const u8 *src);
-
-asmlinkage void twofish_dec_blk(void *ctx, u8 *dst, const u8 *src);
-
-static struct crypto_alg alg = {
-	.cra_name           =   "twofish",
-	.cra_driver_name    =	"twofish-x86_64",
-	.cra_priority       =	200,
-	.cra_flags          =   CRYPTO_ALG_TYPE_CIPHER,
-	.cra_blocksize      =   TF_BLOCK_SIZE,
-	.cra_ctxsize        =   sizeof(struct twofish_ctx),
-	.cra_alignmask      =	3,
-	.cra_module         =   THIS_MODULE,
-	.cra_list           =   LIST_HEAD_INIT(alg.cra_list),
-	.cra_u              =   { .cipher = {
-	.cia_min_keysize    =   TF_MIN_KEY_SIZE,
-	.cia_max_keysize    =   TF_MAX_KEY_SIZE,
-	.cia_setkey         =   twofish_setkey,
-	.cia_encrypt        =   twofish_enc_blk,
-	.cia_decrypt        =   twofish_dec_blk } }
-};
-
-static int __init init(void)
-{
-	return crypto_register_alg(&alg);
-}
-
-static void __exit fini(void)
-{
-	crypto_unregister_alg(&alg);
-}
-
-module_init(init);
-module_exit(fini);
-
-MODULE_LICENSE("GPL");
-MODULE_DESCRIPTION ("Twofish Cipher Algorithm, x86_64 asm optimized");
diff -puN arch/x86_64/crypto/twofish-x86_64-asm.S~revert-x86_64-mm-twofish-cipher---x86_64-assembler /dev/null
--- a/arch/x86_64/crypto/twofish-x86_64-asm.S
+++ /dev/null
@@ -1,406 +0,0 @@
-/***************************************************************************
-*   Copyright (C) 2006 by Joachim Fritschi, <jfritschi@xxxxxxxxxx>        *
-*                                                                         *
-*   This program is free software; you can redistribute it and/or modify  *
-*   it under the terms of the GNU General Public License as published by  *
-*   the Free Software Foundation; either version 2 of the License, or     *
-*   (at your option) any later version.                                   *
-*                                                                         *
-*   This program is distributed in the hope that it will be useful,       *
-*   but WITHOUT ANY WARRANTY; without even the implied warranty of        *
-*   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         *
-*   GNU General Public License for more details.                          *
-*                                                                         *
-*   You should have received a copy of the GNU General Public License     *
-*   along with this program; if not, write to the                         *
-*   Free Software Foundation, Inc.,                                       *
-*   59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.             *
-***************************************************************************/
-
-.file "twofish-x86_64-asm.S"
-.text
-
-#define a_offset	0
-#define b_offset	4
-#define c_offset	8
-#define d_offset	12
-
-/* Structure of the crypto context struct*/
-
-#define s0	0	/* S0 Array 256 Words each */
-#define s1	1024	/* S1 Array */
-#define s2	2048	/* S2 Array */
-#define s3	3072	/* S3 Array */
-#define w	4096	/* 8 whitening keys (word) */
-#define k	4128	/* key 1-32 ( word ) */
-
-/* define a few register aliases to allow macro substitution */
-
-#define R0     %rax
-#define R0D    %eax
-#define R0W    %ax
-#define R0B    %al
-#define R0H    %ah
-
-#define R1     %rbx
-#define R1D    %ebx
-#define R1W    %bx
-#define R1B    %bl
-#define R1H    %bh
-
-#define R2     %rcx
-#define R2D    %ecx
-#define R2W    %cx
-#define R2B    %cl
-#define R2H    %ch
-
-#define R3     %rdx
-#define R3D    %edx
-#define R3W    %dx
-#define R3B    %dl
-#define R3H    %dh
-
-#define R4     %rsi
-#define R4D    %esi
-#define R4W    %six
-#define R4B    %sil
-
-#define R5     %rdi
-#define R5D    %edi
-#define R5W    %dix
-#define R5B    %dil
-
-#define R6     %rsp
-#define R6D    %esp
-#define R6W    %spx
-#define R6B    %spl
-
-#define R7     %rbp
-#define R7D    %ebp
-#define R7W    %bpx
-#define R7B    %bpl
-
-#define R8     %r8
-#define R8D    %r8d
-#define R8W    %r8w
-#define R8B    %r8b
-
-#define R9     %r9
-#define R9D    %r9d
-#define R9W    %r9w
-#define R9B    %r9b
-
-#define R10     %r10
-#define R10D    %r10d
-#define R10W    %r10w
-#define R10B    %r10b
-
-#define R11     %r11
-#define R11D    %r11d
-#define R11W    %r11w
-#define R11B    %r11b
-
-#define R12     %r12
-#define R12D    %r12d
-#define R12W    %r12w
-#define R12B    %r12b
-
-#define R13     %r13
-#define R13D    %r13d
-#define R13W    %r13w
-#define R13B    %r13b
-
-#define R14     %r14
-#define R14D    %r14d
-#define R14W    %r14w
-#define R14B    %r14b
-
-#define R15     %r15
-#define R15D    %r15d
-#define R15W    %r15w
-#define R15B    %r15b
-
-
-
-/* performs input whitening */
-#define input_whitening(src,context,offset)\
-	xor	w+offset(context),	src;
-
-/* performs input whitening */
-#define output_whitening(src,context,offset)\
-	xor	w+16+offset(context),	src;
-
-/* load both round keys */
-#define load_round_key(dsta,dstb,context,round)\
-	mov	k+round(context),	dsta ## D;\
-	mov	k+4+round(context),	dstb ## D;
-
-/* Parameters for all encrypt/decrypt macros:
-a input register containing a
-b input register containing a
-olda register containing the a input of the last round
-oldb register containing the b input of the last round
-newa output register for a
-newb output register for b
-ctx  register cotaining the adress of the crypto context
-round roundoffset for loading the roundkeys
-tmp1 temporary register
-tmp2 temporary register
-key1 register for storing the a roundkey
-key2 register for storing the b roundkey
-*/
-
-#define\
- encrypt_round(a,b,olda,oldb,newa,newb,ctx,round,tmp1,tmp2,key1,key2)\
-	load_round_key(key1,key2,ctx,round);\
-	movzx	a ## B,		newa ## D;\
-	movzx	a ## H,		newb ## D;\
-	ror	$16,		a ## D;\
-	mov	s0(ctx,newa,4),	tmp1 ## D;\
-	xor     s1(ctx,newb,4),	tmp1 ## D;\
-	movzx	a ## B,		newa ## D;\
-	movzx	a ## H,		newb ## D;\
-	xor     s2(ctx,newa,4),	tmp1 ## D;\
-	xor     s3(ctx,newb,4),	tmp1 ## D;\
-	ror	$16,		a ## D;\
-	movzx	b ## B,		newa ## D;\
-	movzx	b ## H,		newb ## D;\
-	ror	$16,		b ## D;\
-	mov     s1(ctx,newa,4),	tmp2 ## D;\
-	xor	s2(ctx,newb,4),	tmp2 ## D;\
-	movzx	b ## B,		newa ## D;\
-	movzx	b ## H,		newb ## D;\
-	xor	s3(ctx,newa,4),	tmp2 ## D;\
-	xor     s0(ctx,newb,4),	tmp2 ## D;\
-	ror	$15,		b ## D;\
-	add	tmp2 ## D,	tmp1 ## D;\
-	add	tmp1 ## D,	tmp2 ## D;\
-	add	tmp1 ## D,	key1 ## D;\
-	add	tmp2 ## D,	key2 ## D;\
-	mov	olda  ## D,	newa ## D;\
-	mov	oldb ## D,	newb ## D;\
-	mov	a ## D,		olda ## D;\
-	mov	b ## D,		oldb ## D;\
-	xor	key1 ## D,	newa ## D;\
-	xor	key2 ## D,	newb ## D;\
-	ror	$1,		newa ## D
-
-/* Last Round can ignore saving a,b for the next round */
-
-#define\
- encrypt_last_round(a,b,olda,oldb,newa,newb,ctx,round,tmp1,tmp2,key1,key2)\
-	load_round_key(key1,key2,ctx,round);\
-	movzx	a ## B,		newa ## D;\
-	movzx	a ## H,		newb ## D;\
-	ror	$16,		a ## D;\
-	mov	s0(ctx,newa,4),	tmp1 ## D;\
-	xor     s1(ctx,newb,4),	tmp1 ## D;\
-	movzx	a ## B,		newa ## D;\
-	movzx	a ## H,		newb ## D;\
-	xor     s2(ctx,newa,4), tmp1 ## D;\
-	xor     s3(ctx,newb,4), tmp1 ## D;\
-	movzx	b ## B,		newa ## D;\
-	movzx	b ## H,		newb ## D;\
-	ror	$16,		b ## D;\
-	mov     s1(ctx,newa,4),	tmp2 ## D;\
-	xor	s2(ctx,newb,4),	tmp2 ## D;\
-	movzx	b ## B,		newa ## D;\
-	movzx	b ## H,		newb ## D;\
-	xor	s3(ctx,newa,4),	tmp2 ## D;\
-	xor     s0(ctx,newb,4),	tmp2 ## D;\
-	add	tmp2 ## D,	tmp1 ## D;\
-	add	tmp1 ## D,	tmp2 ## D;\
-	add	tmp1 ## D,	key1 ## D;\
-	add	tmp2 ## D,	key2 ## D;\
-	mov	olda  ## D,	newa ## D;\
-	mov	oldb ## D,	newb ## D;\
-	xor	key1 ## D,	newa ## D;\
-	xor	key2 ## D,	newb ## D;\
-	ror	$1,		newa ## D
-
-#define\
- decrypt_round(a,b,olda,oldb,newa,newb,ctx,round,tmp1,tmp2,key1,key2)\
-	load_round_key(key1,key2,ctx,round);\
-	movzx	a ## B,		newa ## D;\
-	movzx	a ## H,		newb ## D;\
-	ror	$16,		a ## D;\
-	mov	s0(ctx,newa,4),	tmp1 ## D;\
-	xor	s1(ctx,newb,4),	tmp1 ## D;\
-	movzx	a ## B,		newa;\
-	movzx	a ## H,		newb ## D;\
-	xor	s2(ctx,newa,4),	tmp1 ## D;\
-	xor	s3(ctx,newb,4),	tmp1 ## D;\
-	ror	$15,		a ## D;\
-	movzx	b ## B,		newa ## D;\
-	movzx	b ## H,		newb ## D;\
-	ror	$16,		b ## D;\
-	mov	s1(ctx,newa,4),	tmp2 ## D;\
-	xor	s2(ctx,newb,4),	tmp2 ## D;\
-	movzx	b ## B,		newa ## D;\
-	movzx	b ## H,		newb ## D;\
-	xor	s3(ctx,newa,4),	tmp2 ## D;\
-	xor	s0(ctx,newb,4),	tmp2 ## D;\
-	ror	$16,		b ## D;\
-	add	tmp2 ## D,	tmp1 ## D;\
-	add	tmp1 ## D,	tmp2 ## D;\
-	add	tmp1 ## D,	key1 ## D;\
-	add	tmp2 ## D,	key2 ## D;\
-	mov	olda  ## D,	newa ## D;\
-	mov	oldb ## D,	newb ## D;\
-	mov	a ## D,		olda ## D;\
-	mov	b ## D,		oldb ## D;\
-	xor	key1 ## D,	newa ## D;\
-	xor	key2 ## D,	newb ## D;\
-	ror	$1,		newb ## D
-
-/* Last Round can ignore saving a,b for the next round */
-
-#define\
- decrypt_last_round(a,b,olda,oldb,newa,newb,ctx,round,tmp1,tmp2,key1,key2)\
-	load_round_key(key1,key2,ctx,round);\
-	movzx	a ## B,		newa ## D;\
-	movzx	a ## H,		newb ## D;\
-	ror	$16,		a ## D;\
-	mov	s0(ctx,newa,4),	tmp1 ## D;\
-	xor	s1(ctx,newb,4),	tmp1 ## D;\
-	movzx	a ## B,		newa ## D;\
-	movzx	a ## H,		newb ## D;\
-	xor	s2(ctx,newa,4),	tmp1 ## D;\
-	xor	s3(ctx,newb,4),	tmp1 ## D;\
-	movzx	b ## B,		newa;\
-	movzx	b ## H,		newb ## D;\
-	ror	$16,b 		## D;\
-	mov	s1(ctx,newa,4),	tmp2 ## D;\
-	xor	s2(ctx,newb,4),	tmp2 ## D;\
-	movzx	b ## B,		newa ## D;\
-	movzx	b ## H,		newb ## D;\
-	xor	s3(ctx,newa,4),	tmp2 ## D;\
-	xor	s0(ctx,newb,4),	tmp2 ## D;\
-	add	tmp2 ## D,	tmp1 ## D;\
-	add	tmp1 ## D,	tmp2 ## D;\
-	add	tmp1 ## D,	key1 ## D;\
-	add	tmp2 ## D,	key2 ## D;\
-	mov	olda  ## D,	newa ## D;\
-	mov	oldb ## D,	newb ## D;\
-	xor	key1 ## D,	newa ## D;\
-	xor	key2 ## D,	newb ## D;\
-	ror	$1,		newb ## D
-
-
-
-
-.align 8
-.global twofish_enc_blk
-.global twofish_dec_blk
-
-
-
-twofish_enc_blk:
-	pushq    R1
-	pushq	 R12
-	pushq	 R13
-
-	/* r5 contains the crypto ctx adress */
-	/* r4 contains the output adress */
-	/* r3 contains the input adress */
-
-	movq	(R3),	R1
-	movq	8(R3),	R9
-	input_whitening(R1,R5,a_offset)
-	input_whitening(R9,R5,c_offset)
-	mov	R1D,	R0D
-	shr	$32,	R1
-	mov	R9D,	R8D
-	shr	$32,	R9
-	rol	$1,	R9D
-
-	encrypt_round(R0,R1,R8,R9,R2,R3,R5,0,R10,R11,R12,R13);
-	encrypt_round(R2,R3,R8,R9,R0,R1,R5,8,R10,R11,R12,R13);
-	encrypt_round(R0,R1,R8,R9,R2,R3,R5,2*8,R10,R11,R12,R13);
-	encrypt_round(R2,R3,R8,R9,R0,R1,R5,3*8,R10,R11,R12,R13);
-	encrypt_round(R0,R1,R8,R9,R2,R3,R5,4*8,R10,R11,R12,R13);
-	encrypt_round(R2,R3,R8,R9,R0,R1,R5,5*8,R10,R11,R12,R13);
-	encrypt_round(R0,R1,R8,R9,R2,R3,R5,6*8,R10,R11,R12,R13);
-	encrypt_round(R2,R3,R8,R9,R0,R1,R5,7*8,R10,R11,R12,R13);
-	encrypt_round(R0,R1,R8,R9,R2,R3,R5,8*8,R10,R11,R12,R13);
-	encrypt_round(R2,R3,R8,R9,R0,R1,R5,9*8,R10,R11,R12,R13);
-	encrypt_round(R0,R1,R8,R9,R2,R3,R5,10*8,R10,R11,R12,R13);
-	encrypt_round(R2,R3,R8,R9,R0,R1,R5,11*8,R10,R11,R12,R13);
-	encrypt_round(R0,R1,R8,R9,R2,R3,R5,12*8,R10,R11,R12,R13);
-	encrypt_round(R2,R3,R8,R9,R0,R1,R5,13*8,R10,R11,R12,R13);
-	encrypt_round(R0,R1,R8,R9,R2,R3,R5,14*8,R10,R11,R12,R13);
-
-	mov	R3,	R13
-	shl	$32,	R13
-	xor	R2,	R13
-	output_whitening(R13,R5,a_offset)
-	movq	R13,	(R4)
-
-	encrypt_last_round(R2,R3,R8,R9,R0,R1,R5,15*8,R10,R11,R12,R13);
-
-
-	shl	$32,	R1
-	xor	R0,	R1
-
-	output_whitening(R1,R5,c_offset)
-	movq	R1,	8(R4)
-
-	popq	R13
-	popq	R12
-	popq	R1
-	movq	$1,%rax
-	ret
-
-twofish_dec_blk:
-	pushq    R1
-	pushq	 R12
-	pushq	 R13
-
-	/* r5 contains the crypto ctx adress */
-	/* r4 contains the output adress */
-	/* r3 contains the input adress */
-
-	movq	(R3),	R1
-	movq	8(R3),	R9
-	output_whitening(R1,R5,a_offset)
-	output_whitening(R9,R5,c_offset)
-	mov	R1D,	R0D
-	shr	$32,	R1
-	mov	R9D,	R8D
-	shr	$32,	R9
-	rol	$1,	R8D
-
-	decrypt_round(R0,R1,R8,R9,R2,R3,R5,15*8,R10,R11,R12,R13);
-	decrypt_round(R2,R3,R8,R9,R0,R1,R5,14*8,R10,R11,R12,R13);
-	decrypt_round(R0,R1,R8,R9,R2,R3,R5,13*8,R10,R11,R12,R13);
-	decrypt_round(R2,R3,R8,R9,R0,R1,R5,12*8,R10,R11,R12,R13);
-	decrypt_round(R0,R1,R8,R9,R2,R3,R5,11*8,R10,R11,R12,R13);
-	decrypt_round(R2,R3,R8,R9,R0,R1,R5,10*8,R10,R11,R12,R13);
-	decrypt_round(R0,R1,R8,R9,R2,R3,R5,9*8,R10,R11,R12,R13);
-	decrypt_round(R2,R3,R8,R9,R0,R1,R5,8*8,R10,R11,R12,R13);
-	decrypt_round(R0,R1,R8,R9,R2,R3,R5,7*8,R10,R11,R12,R13);
-	decrypt_round(R2,R3,R8,R9,R0,R1,R5,6*8,R10,R11,R12,R13);
-	decrypt_round(R0,R1,R8,R9,R2,R3,R5,5*8,R10,R11,R12,R13);
-	decrypt_round(R2,R3,R8,R9,R0,R1,R5,4*8,R10,R11,R12,R13);
-	decrypt_round(R0,R1,R8,R9,R2,R3,R5,3*8,R10,R11,R12,R13);
-	decrypt_round(R2,R3,R8,R9,R0,R1,R5,2*8,R10,R11,R12,R13);
-	decrypt_round(R0,R1,R8,R9,R2,R3,R5,8,R10,R11,R12,R13);
-
-	mov	R3,	R13
-	shl	$32,	R13
-	xor	R2,	R13
-	input_whitening(R13,R5,a_offset)
-	movq	R13,	(R4)
-
-	decrypt_last_round(R2,R3,R8,R9,R0,R1,R5,0,R10,R11,R12,R13);
-
-	shl	$32,	R1
-	xor	R0,	R1
-	input_whitening(R1,R5,c_offset)
-	movq	R1,	8(R4)
-
-	popq	R13
-	popq	R12
-	popq	R1
-	movq	$1,	%rax
-	ret
diff -puN crypto/Kconfig~revert-x86_64-mm-twofish-cipher---x86_64-assembler crypto/Kconfig
--- a/crypto/Kconfig~revert-x86_64-mm-twofish-cipher---x86_64-assembler
+++ a/crypto/Kconfig
@@ -156,20 +156,6 @@ config CRYPTO_TWOFISH_586
 	  See also:
 	  <http://www.schneier.com/twofish.html>
 
-config CRYPTO_TWOFISH_X86_64
-        tristate "Twofish cipher algorithm (x86_64)"
-        depends on CRYPTO && ((X86 || UML_X86) && 64BIT)
-        help
-          Twofish cipher algorithm (x86_64).
-
-          Twofish was submitted as an AES (Advanced Encryption Standard)
-          candidate cipher by researchers at CounterPane Systems.  It is a
-          16 round block cipher supporting key sizes of 128, 192, and 256
-          bits.
-
-          See also:
-          <http://www.schneier.com/twofish.html>
-
 config CRYPTO_SERPENT
 	tristate "Serpent cipher algorithm"
 	depends on CRYPTO
_

Patches currently in -mm which might be from akpm@xxxxxxxx are

revert-powernow-k8-crash-workaround.patch
git-acpi.patch
reapply-powernow-k8-crash-workaround.patch
acpi-update-asus_acpi-driver-registration-fix.patch
catch-notification-of-memory-add-event-of-acpi-via-container-driver-register-start-func-for-memory-device.patch
catch-notification-of-memory-add-event-of-acpi-via-container-driveravoid-redundant-call-add_memory.patch
remove-for_each_cpu.patch
sony_apci-resume.patch
git-agpgart.patch
kauditd_thread-warning-fix.patch
git-block.patch
git-cifs.patch
git-cpufreq-fixup.patch
git-dvb.patch
git-gfs2.patch
git-ieee1394.patch
git-infiniband.patch
git-input.patch
git-intelfb.patch
git-kbuild.patch
git-klibc.patch
git-hdrcleanup-fixup.patch
git-hdrcleanup-vs-git-klibc-on-ia64.patch
git-hdrcleanup-vs-git-klibc-on-ia64-2.patch
git-hdrinstall-fixup.patch
git-libata-all.patch
git-libata-all-fixup.patch
libata-reduce-timeouts.patch
git-mmc.patch
git-mtd.patch
git-mtd-fixup.patch
git-netdev-all.patch
git-netdev-all-fixup.patch
forcedeth-typecast-cleanup.patch
git-net.patch
git-net-git-klibc-fixup.patch
forcedeth-xmit_lock-went-away.patch
git-nfs-fixup.patch
git-powerpc.patch
git-rbtree.patch
git-sas.patch
revert-gregkh-pci-pci-test-that-drivers-properly-call-pci_set_master.patch
megaraid_sas-add-support-for-zcr-controller-fix.patch
areca-raid-linux-scsi-driver.patch
git-scsi-target-warning-fix.patch
git-scsi-target-fixup.patch
git-supertrak-fixup.patch
revert-x86_64-mm-twofish-cipher---x86_64-assembler.patch
revert-x86_64-mm-twofish-cipher---i586-assembler.patch
revert-x86_64-mm-twofish-cipher---priority-fix.patch
revert-x86_64-mm-twofish-cipher---split-out-common-c-code.patch
x86_64-mm-moving-phys_proc_id-and-cpu_core_id-to-cpuinfo_x86-warning-fix.patch
git-xfs.patch
pg_uncached-is-ia64-only.patch
fix-update_mmu_cache-in-fremapc-fix.patch
initialise-total_memory-earlier.patch
page-migration-simplify-migrate_pages-tweaks.patch
page-migration-support-moving-of-individual-pages-x86-support-fix.patch
acx1xx-wireless-driver.patch
tiacx-pci-build-fix.patch
tiacx-ia64-fix.patch
x86-kernel-irq-balancer-fix-tidy.patch
i386-moving-phys_proc_id-and-cpu_core_id-to-cpuinfo_x86-warning-fix.patch
vdso-randomize-the-i386-vdso-by-moving-it-into-a-vma-tidy.patch
vdso-randomize-the-i386-vdso-by-moving-it-into-a-vma-arch_vma_name-fix.patch
vdso-randomize-the-i386-vdso-by-moving-it-into-a-vma-vs-x86_64-mm-reliable-stack-trace-support-i386.patch
vdso-randomize-the-i386-vdso-by-moving-it-into-a-vma-vs-x86_64-mm-reliable-stack-trace-support-i386-2.patch
vdso-randomize-the-i386-vdso-by-moving-it-into-a-vma-vs-x86_64-mm-reliable-stack-trace-support-i386-2-revert-maxmem-change.patch
prune_one_dentry-tweaks.patch
mmput-might-sleep.patch
jbd-avoid-kfree-null.patch
ext3_clear_inode-avoid-kfree-null.patch
leds-amstrad-delta-led-support-tidy.patch
connector-exports.patch
config_net=n-build-fix.patch
rewritten-backlight-infrastructure-for-portable-apple-computers-fix.patch
deprecate-smbfs-in-favour-of-cifs.patch
ufs-printk-warning-fixes.patch
msnd-section-fix.patch
openpromfs-factorize-out-tidy.patch
add-driver-for-arm-amba-pl031-rtc-fix.patch
add-export_unused_symbol-and-export_unused_symbol_gpl-default.patch
kernel-sysc-cleanups-fix.patch
cpqarray-section-fix.patch
pdflush-handle-resume-wakeups.patch
schedule_on_each_cpu-reduce-kmalloc-size.patch
load_module-cleanup.patch
ax88796-parallel-port-driver-build-fix.patch
keys-fix-race-between-two-instantiators-of-a-key-tidy.patch
for_each_cpu_mask-warning-fix.patch
add-max6902-rtc-support-tidy.patch
add-v3020-rtc-support-tidy.patch
at91rm9200-rtc-driver-tidy.patch
readahead-backoff-on-i-o-error-tweaks.patch
per-task-delay-accounting-proc-export-of-aggregated-block-i-o-delays-warning-fix.patch
add-via-hw-rng-driver-fix.patch
hangcheck-remove-monotomic_clock-on-x86.patch
sched-fix-smt-nice-lock-contention-and-optimization-tidy.patch
mark-address_space_operations-const-vs-ecryptfs-mmap-operations.patch
ecryptfs-alpha-build-fix.patch
namespaces-add-nsproxy-dont-include-compileh.patch
namespaces-utsname-switch-to-using-uts-namespaces-alpha-fix.patch
namespaces-utsname-use-init_utsname-when-appropriate-cifs-update.patch
namespaces-utsname-implement-utsname-namespaces-export.patch
namespaces-utsname-implement-utsname-namespaces-dont-include-compileh.patch
namespaces-utsname-sysctl-hack-cleanup-2-fix.patch
ipc-namespace-core-fix.patch
readahead-sysctl-parameters-fix.patch
make-copy_from_user_inatomic-not-zero-the-tail-on-i386-vs-reiser4.patch
reiser4-hardirq-include-fix.patch
reiser4-run-truncate_inode_pages-in-reiser4_delete_inode.patch
ide_dma_speed-fixes-warning-fix.patch
ide_dma_speed-fixes-tidy.patch
hpt3xx-rework-rate-filtering-tidy.patch
savagefb-add-state-save-and_restore-hooks-tidy.patch
au1100fb-add-power-management-support-tidy.patch
lib-add-idr_replace-tidy.patch
genirq-rename-desc-handler-to-desc-chip-power-fix.patch
genirq-rename-desc-handler-to-desc-chip-ia64-fix.patch
genirq-rename-desc-handler-to-desc-chip-ia64-fix-2.patch
genirq-convert-the-i386-architecture-to-irq-chips-fix-2.patch
lock-validator-beautify-x86_64-stacktraces-fix.patch
lock-validator-beautify-x86_64-stacktraces-fix-4.patch
lock-validator-stacktrace-build-fix.patch
lock-validator-stacktrace-warning-fix.patch
lock-validator-irqtrace-core-powerpc-fix-1.patch
lock-validator-irqtrace-core-non-x86-fix.patch
lock-validator-irqtrace-core-non-x86-fix-2.patch
lock-validator-irqtrace-core-non-x86-fix-3.patch
lock-validator-add-per_cpu_offset-fix.patch
lock-validator-core-multichar-fix.patch
lock-validator-prove-rwsem-locking-correctness-fix.patch
lock-validator-prove-rwsem-locking-correctness-powerpc-fix.patch
lock-validator-special-locking-serial-fix.patch
lock-validator-special-locking-sb-s_umount-fix.patch
lock-validator-enable-lock-validator-in-kconfig-not-yet.patch
lockdep-x86-only.patch
lockdep-really-x86-only.patch
lockdep-really-really-x86-only.patch
kgdb-core-lite-add-reboot-command.patch
kgdb-8250-fix.patch
nr_blockdev_pages-in_interrupt-warning.patch
device-suspend-debug.patch
revert-tty-buffering-comment-out-debug-code.patch
slab-leaks3-default-y.patch
x86-kmap_atomic-debugging.patch

-
To unsubscribe from this list: send the line "unsubscribe mm-commits" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Kernel Newbies FAQ]     [Kernel Archive]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [Bugtraq]     [Photo]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]

  Powered by Linux