The patch titled revert x86_64-mm-twofish-cipher---x86_64-assembler has been removed from the -mm tree. Its filename is revert-x86_64-mm-twofish-cipher---x86_64-assembler.patch This patch was dropped because it was merged into mainline or a subsystem tree ------------------------------------------------------ Subject: revert x86_64-mm-twofish-cipher---x86_64-assembler From: Andrew Morton <akpm@xxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxx> --- arch/x86_64/crypto/Makefile | 3 arch/x86_64/crypto/twofish-x86_64-asm.S | 406 ---------------------- arch/x86_64/crypto/twofish.c | 86 ---- crypto/Kconfig | 14 4 files changed, 509 deletions(-) diff -puN arch/x86_64/crypto/Makefile~revert-x86_64-mm-twofish-cipher---x86_64-assembler arch/x86_64/crypto/Makefile --- a/arch/x86_64/crypto/Makefile~revert-x86_64-mm-twofish-cipher---x86_64-assembler +++ a/arch/x86_64/crypto/Makefile @@ -5,8 +5,5 @@ # obj-$(CONFIG_CRYPTO_AES_X86_64) += aes-x86_64.o -obj-$(CONFIG_CRYPTO_TWOFISH_X86_64) += twofish-x86_64.o aes-x86_64-y := aes-x86_64-asm.o aes.o -twofish-x86_64-y := twofish-x86_64-asm.o twofish.o ../../../crypto/twofish_common.o - diff -puN arch/x86_64/crypto/twofish.c~revert-x86_64-mm-twofish-cipher---x86_64-assembler /dev/null --- a/arch/x86_64/crypto/twofish.c +++ /dev/null @@ -1,86 +0,0 @@ -/* - * Glue Code for optimized x86_64 assembler version of TWOFISH - * - * Originally Twofish for GPG - * By Matthew Skala <mskala@xxxxxxxxxxxxxxxxx>, July 26, 1998 - * 256-bit key length added March 20, 1999 - * Some modifications to reduce the text size by Werner Koch, April, 1998 - * Ported to the kerneli patch by Marc Mutz <Marc@xxxxxxxx> - * Ported to CryptoAPI by Colin Slater <hoho@xxxxxxxxxxxx> - * - * The original author has disclaimed all copyright interest in this - * code and thus put it in the public domain. The subsequent authors - * have put this under the GNU General Public License. - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 - * USA - * - * This code is a "clean room" implementation, written from the paper - * _Twofish: A 128-Bit Block Cipher_ by Bruce Schneier, John Kelsey, - * Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson, available - * through http://www.counterpane.com/twofish.html - * - * For background information on multiplication in finite fields, used for - * the matrix operations in the key schedule, see the book _Contemporary - * Abstract Algebra_ by Joseph A. Gallian, especially chapter 22 in the - * Third Edition. - */ - -#include <asm/byteorder.h> -#include <linux/module.h> -#include <linux/init.h> -#include <linux/types.h> -#include <linux/errno.h> -#include <linux/crypto.h> -#include <linux/bitops.h> -#include <crypto/twofish.h> - -asmlinkage void twofish_enc_blk(void *ctx, u8 *dst, const u8 *src); - -asmlinkage void twofish_dec_blk(void *ctx, u8 *dst, const u8 *src); - -static struct crypto_alg alg = { - .cra_name = "twofish", - .cra_driver_name = "twofish-x86_64", - .cra_priority = 200, - .cra_flags = CRYPTO_ALG_TYPE_CIPHER, - .cra_blocksize = TF_BLOCK_SIZE, - .cra_ctxsize = sizeof(struct twofish_ctx), - .cra_alignmask = 3, - .cra_module = THIS_MODULE, - .cra_list = LIST_HEAD_INIT(alg.cra_list), - .cra_u = { .cipher = { - .cia_min_keysize = TF_MIN_KEY_SIZE, - .cia_max_keysize = TF_MAX_KEY_SIZE, - .cia_setkey = twofish_setkey, - .cia_encrypt = twofish_enc_blk, - .cia_decrypt = twofish_dec_blk } } -}; - -static int __init init(void) -{ - return crypto_register_alg(&alg); -} - -static void __exit fini(void) -{ - crypto_unregister_alg(&alg); -} - -module_init(init); -module_exit(fini); - -MODULE_LICENSE("GPL"); -MODULE_DESCRIPTION ("Twofish Cipher Algorithm, x86_64 asm optimized"); diff -puN arch/x86_64/crypto/twofish-x86_64-asm.S~revert-x86_64-mm-twofish-cipher---x86_64-assembler /dev/null --- a/arch/x86_64/crypto/twofish-x86_64-asm.S +++ /dev/null @@ -1,406 +0,0 @@ -/*************************************************************************** -* Copyright (C) 2006 by Joachim Fritschi, <jfritschi@xxxxxxxxxx> * -* * -* This program is free software; you can redistribute it and/or modify * -* it under the terms of the GNU General Public License as published by * -* the Free Software Foundation; either version 2 of the License, or * -* (at your option) any later version. * -* * -* This program is distributed in the hope that it will be useful, * -* but WITHOUT ANY WARRANTY; without even the implied warranty of * -* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * -* GNU General Public License for more details. * -* * -* You should have received a copy of the GNU General Public License * -* along with this program; if not, write to the * -* Free Software Foundation, Inc., * -* 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. * -***************************************************************************/ - -.file "twofish-x86_64-asm.S" -.text - -#define a_offset 0 -#define b_offset 4 -#define c_offset 8 -#define d_offset 12 - -/* Structure of the crypto context struct*/ - -#define s0 0 /* S0 Array 256 Words each */ -#define s1 1024 /* S1 Array */ -#define s2 2048 /* S2 Array */ -#define s3 3072 /* S3 Array */ -#define w 4096 /* 8 whitening keys (word) */ -#define k 4128 /* key 1-32 ( word ) */ - -/* define a few register aliases to allow macro substitution */ - -#define R0 %rax -#define R0D %eax -#define R0W %ax -#define R0B %al -#define R0H %ah - -#define R1 %rbx -#define R1D %ebx -#define R1W %bx -#define R1B %bl -#define R1H %bh - -#define R2 %rcx -#define R2D %ecx -#define R2W %cx -#define R2B %cl -#define R2H %ch - -#define R3 %rdx -#define R3D %edx -#define R3W %dx -#define R3B %dl -#define R3H %dh - -#define R4 %rsi -#define R4D %esi -#define R4W %six -#define R4B %sil - -#define R5 %rdi -#define R5D %edi -#define R5W %dix -#define R5B %dil - -#define R6 %rsp -#define R6D %esp -#define R6W %spx -#define R6B %spl - -#define R7 %rbp -#define R7D %ebp -#define R7W %bpx -#define R7B %bpl - -#define R8 %r8 -#define R8D %r8d -#define R8W %r8w -#define R8B %r8b - -#define R9 %r9 -#define R9D %r9d -#define R9W %r9w -#define R9B %r9b - -#define R10 %r10 -#define R10D %r10d -#define R10W %r10w -#define R10B %r10b - -#define R11 %r11 -#define R11D %r11d -#define R11W %r11w -#define R11B %r11b - -#define R12 %r12 -#define R12D %r12d -#define R12W %r12w -#define R12B %r12b - -#define R13 %r13 -#define R13D %r13d -#define R13W %r13w -#define R13B %r13b - -#define R14 %r14 -#define R14D %r14d -#define R14W %r14w -#define R14B %r14b - -#define R15 %r15 -#define R15D %r15d -#define R15W %r15w -#define R15B %r15b - - - -/* performs input whitening */ -#define input_whitening(src,context,offset)\ - xor w+offset(context), src; - -/* performs input whitening */ -#define output_whitening(src,context,offset)\ - xor w+16+offset(context), src; - -/* load both round keys */ -#define load_round_key(dsta,dstb,context,round)\ - mov k+round(context), dsta ## D;\ - mov k+4+round(context), dstb ## D; - -/* Parameters for all encrypt/decrypt macros: -a input register containing a -b input register containing a -olda register containing the a input of the last round -oldb register containing the b input of the last round -newa output register for a -newb output register for b -ctx register cotaining the adress of the crypto context -round roundoffset for loading the roundkeys -tmp1 temporary register -tmp2 temporary register -key1 register for storing the a roundkey -key2 register for storing the b roundkey -*/ - -#define\ - encrypt_round(a,b,olda,oldb,newa,newb,ctx,round,tmp1,tmp2,key1,key2)\ - load_round_key(key1,key2,ctx,round);\ - movzx a ## B, newa ## D;\ - movzx a ## H, newb ## D;\ - ror $16, a ## D;\ - mov s0(ctx,newa,4), tmp1 ## D;\ - xor s1(ctx,newb,4), tmp1 ## D;\ - movzx a ## B, newa ## D;\ - movzx a ## H, newb ## D;\ - xor s2(ctx,newa,4), tmp1 ## D;\ - xor s3(ctx,newb,4), tmp1 ## D;\ - ror $16, a ## D;\ - movzx b ## B, newa ## D;\ - movzx b ## H, newb ## D;\ - ror $16, b ## D;\ - mov s1(ctx,newa,4), tmp2 ## D;\ - xor s2(ctx,newb,4), tmp2 ## D;\ - movzx b ## B, newa ## D;\ - movzx b ## H, newb ## D;\ - xor s3(ctx,newa,4), tmp2 ## D;\ - xor s0(ctx,newb,4), tmp2 ## D;\ - ror $15, b ## D;\ - add tmp2 ## D, tmp1 ## D;\ - add tmp1 ## D, tmp2 ## D;\ - add tmp1 ## D, key1 ## D;\ - add tmp2 ## D, key2 ## D;\ - mov olda ## D, newa ## D;\ - mov oldb ## D, newb ## D;\ - mov a ## D, olda ## D;\ - mov b ## D, oldb ## D;\ - xor key1 ## D, newa ## D;\ - xor key2 ## D, newb ## D;\ - ror $1, newa ## D - -/* Last Round can ignore saving a,b for the next round */ - -#define\ - encrypt_last_round(a,b,olda,oldb,newa,newb,ctx,round,tmp1,tmp2,key1,key2)\ - load_round_key(key1,key2,ctx,round);\ - movzx a ## B, newa ## D;\ - movzx a ## H, newb ## D;\ - ror $16, a ## D;\ - mov s0(ctx,newa,4), tmp1 ## D;\ - xor s1(ctx,newb,4), tmp1 ## D;\ - movzx a ## B, newa ## D;\ - movzx a ## H, newb ## D;\ - xor s2(ctx,newa,4), tmp1 ## D;\ - xor s3(ctx,newb,4), tmp1 ## D;\ - movzx b ## B, newa ## D;\ - movzx b ## H, newb ## D;\ - ror $16, b ## D;\ - mov s1(ctx,newa,4), tmp2 ## D;\ - xor s2(ctx,newb,4), tmp2 ## D;\ - movzx b ## B, newa ## D;\ - movzx b ## H, newb ## D;\ - xor s3(ctx,newa,4), tmp2 ## D;\ - xor s0(ctx,newb,4), tmp2 ## D;\ - add tmp2 ## D, tmp1 ## D;\ - add tmp1 ## D, tmp2 ## D;\ - add tmp1 ## D, key1 ## D;\ - add tmp2 ## D, key2 ## D;\ - mov olda ## D, newa ## D;\ - mov oldb ## D, newb ## D;\ - xor key1 ## D, newa ## D;\ - xor key2 ## D, newb ## D;\ - ror $1, newa ## D - -#define\ - decrypt_round(a,b,olda,oldb,newa,newb,ctx,round,tmp1,tmp2,key1,key2)\ - load_round_key(key1,key2,ctx,round);\ - movzx a ## B, newa ## D;\ - movzx a ## H, newb ## D;\ - ror $16, a ## D;\ - mov s0(ctx,newa,4), tmp1 ## D;\ - xor s1(ctx,newb,4), tmp1 ## D;\ - movzx a ## B, newa;\ - movzx a ## H, newb ## D;\ - xor s2(ctx,newa,4), tmp1 ## D;\ - xor s3(ctx,newb,4), tmp1 ## D;\ - ror $15, a ## D;\ - movzx b ## B, newa ## D;\ - movzx b ## H, newb ## D;\ - ror $16, b ## D;\ - mov s1(ctx,newa,4), tmp2 ## D;\ - xor s2(ctx,newb,4), tmp2 ## D;\ - movzx b ## B, newa ## D;\ - movzx b ## H, newb ## D;\ - xor s3(ctx,newa,4), tmp2 ## D;\ - xor s0(ctx,newb,4), tmp2 ## D;\ - ror $16, b ## D;\ - add tmp2 ## D, tmp1 ## D;\ - add tmp1 ## D, tmp2 ## D;\ - add tmp1 ## D, key1 ## D;\ - add tmp2 ## D, key2 ## D;\ - mov olda ## D, newa ## D;\ - mov oldb ## D, newb ## D;\ - mov a ## D, olda ## D;\ - mov b ## D, oldb ## D;\ - xor key1 ## D, newa ## D;\ - xor key2 ## D, newb ## D;\ - ror $1, newb ## D - -/* Last Round can ignore saving a,b for the next round */ - -#define\ - decrypt_last_round(a,b,olda,oldb,newa,newb,ctx,round,tmp1,tmp2,key1,key2)\ - load_round_key(key1,key2,ctx,round);\ - movzx a ## B, newa ## D;\ - movzx a ## H, newb ## D;\ - ror $16, a ## D;\ - mov s0(ctx,newa,4), tmp1 ## D;\ - xor s1(ctx,newb,4), tmp1 ## D;\ - movzx a ## B, newa ## D;\ - movzx a ## H, newb ## D;\ - xor s2(ctx,newa,4), tmp1 ## D;\ - xor s3(ctx,newb,4), tmp1 ## D;\ - movzx b ## B, newa;\ - movzx b ## H, newb ## D;\ - ror $16,b ## D;\ - mov s1(ctx,newa,4), tmp2 ## D;\ - xor s2(ctx,newb,4), tmp2 ## D;\ - movzx b ## B, newa ## D;\ - movzx b ## H, newb ## D;\ - xor s3(ctx,newa,4), tmp2 ## D;\ - xor s0(ctx,newb,4), tmp2 ## D;\ - add tmp2 ## D, tmp1 ## D;\ - add tmp1 ## D, tmp2 ## D;\ - add tmp1 ## D, key1 ## D;\ - add tmp2 ## D, key2 ## D;\ - mov olda ## D, newa ## D;\ - mov oldb ## D, newb ## D;\ - xor key1 ## D, newa ## D;\ - xor key2 ## D, newb ## D;\ - ror $1, newb ## D - - - - -.align 8 -.global twofish_enc_blk -.global twofish_dec_blk - - - -twofish_enc_blk: - pushq R1 - pushq R12 - pushq R13 - - /* r5 contains the crypto ctx adress */ - /* r4 contains the output adress */ - /* r3 contains the input adress */ - - movq (R3), R1 - movq 8(R3), R9 - input_whitening(R1,R5,a_offset) - input_whitening(R9,R5,c_offset) - mov R1D, R0D - shr $32, R1 - mov R9D, R8D - shr $32, R9 - rol $1, R9D - - encrypt_round(R0,R1,R8,R9,R2,R3,R5,0,R10,R11,R12,R13); - encrypt_round(R2,R3,R8,R9,R0,R1,R5,8,R10,R11,R12,R13); - encrypt_round(R0,R1,R8,R9,R2,R3,R5,2*8,R10,R11,R12,R13); - encrypt_round(R2,R3,R8,R9,R0,R1,R5,3*8,R10,R11,R12,R13); - encrypt_round(R0,R1,R8,R9,R2,R3,R5,4*8,R10,R11,R12,R13); - encrypt_round(R2,R3,R8,R9,R0,R1,R5,5*8,R10,R11,R12,R13); - encrypt_round(R0,R1,R8,R9,R2,R3,R5,6*8,R10,R11,R12,R13); - encrypt_round(R2,R3,R8,R9,R0,R1,R5,7*8,R10,R11,R12,R13); - encrypt_round(R0,R1,R8,R9,R2,R3,R5,8*8,R10,R11,R12,R13); - encrypt_round(R2,R3,R8,R9,R0,R1,R5,9*8,R10,R11,R12,R13); - encrypt_round(R0,R1,R8,R9,R2,R3,R5,10*8,R10,R11,R12,R13); - encrypt_round(R2,R3,R8,R9,R0,R1,R5,11*8,R10,R11,R12,R13); - encrypt_round(R0,R1,R8,R9,R2,R3,R5,12*8,R10,R11,R12,R13); - encrypt_round(R2,R3,R8,R9,R0,R1,R5,13*8,R10,R11,R12,R13); - encrypt_round(R0,R1,R8,R9,R2,R3,R5,14*8,R10,R11,R12,R13); - - mov R3, R13 - shl $32, R13 - xor R2, R13 - output_whitening(R13,R5,a_offset) - movq R13, (R4) - - encrypt_last_round(R2,R3,R8,R9,R0,R1,R5,15*8,R10,R11,R12,R13); - - - shl $32, R1 - xor R0, R1 - - output_whitening(R1,R5,c_offset) - movq R1, 8(R4) - - popq R13 - popq R12 - popq R1 - movq $1,%rax - ret - -twofish_dec_blk: - pushq R1 - pushq R12 - pushq R13 - - /* r5 contains the crypto ctx adress */ - /* r4 contains the output adress */ - /* r3 contains the input adress */ - - movq (R3), R1 - movq 8(R3), R9 - output_whitening(R1,R5,a_offset) - output_whitening(R9,R5,c_offset) - mov R1D, R0D - shr $32, R1 - mov R9D, R8D - shr $32, R9 - rol $1, R8D - - decrypt_round(R0,R1,R8,R9,R2,R3,R5,15*8,R10,R11,R12,R13); - decrypt_round(R2,R3,R8,R9,R0,R1,R5,14*8,R10,R11,R12,R13); - decrypt_round(R0,R1,R8,R9,R2,R3,R5,13*8,R10,R11,R12,R13); - decrypt_round(R2,R3,R8,R9,R0,R1,R5,12*8,R10,R11,R12,R13); - decrypt_round(R0,R1,R8,R9,R2,R3,R5,11*8,R10,R11,R12,R13); - decrypt_round(R2,R3,R8,R9,R0,R1,R5,10*8,R10,R11,R12,R13); - decrypt_round(R0,R1,R8,R9,R2,R3,R5,9*8,R10,R11,R12,R13); - decrypt_round(R2,R3,R8,R9,R0,R1,R5,8*8,R10,R11,R12,R13); - decrypt_round(R0,R1,R8,R9,R2,R3,R5,7*8,R10,R11,R12,R13); - decrypt_round(R2,R3,R8,R9,R0,R1,R5,6*8,R10,R11,R12,R13); - decrypt_round(R0,R1,R8,R9,R2,R3,R5,5*8,R10,R11,R12,R13); - decrypt_round(R2,R3,R8,R9,R0,R1,R5,4*8,R10,R11,R12,R13); - decrypt_round(R0,R1,R8,R9,R2,R3,R5,3*8,R10,R11,R12,R13); - decrypt_round(R2,R3,R8,R9,R0,R1,R5,2*8,R10,R11,R12,R13); - decrypt_round(R0,R1,R8,R9,R2,R3,R5,8,R10,R11,R12,R13); - - mov R3, R13 - shl $32, R13 - xor R2, R13 - input_whitening(R13,R5,a_offset) - movq R13, (R4) - - decrypt_last_round(R2,R3,R8,R9,R0,R1,R5,0,R10,R11,R12,R13); - - shl $32, R1 - xor R0, R1 - input_whitening(R1,R5,c_offset) - movq R1, 8(R4) - - popq R13 - popq R12 - popq R1 - movq $1, %rax - ret diff -puN crypto/Kconfig~revert-x86_64-mm-twofish-cipher---x86_64-assembler crypto/Kconfig --- a/crypto/Kconfig~revert-x86_64-mm-twofish-cipher---x86_64-assembler +++ a/crypto/Kconfig @@ -156,20 +156,6 @@ config CRYPTO_TWOFISH_586 See also: <http://www.schneier.com/twofish.html> -config CRYPTO_TWOFISH_X86_64 - tristate "Twofish cipher algorithm (x86_64)" - depends on CRYPTO && ((X86 || UML_X86) && 64BIT) - help - Twofish cipher algorithm (x86_64). - - Twofish was submitted as an AES (Advanced Encryption Standard) - candidate cipher by researchers at CounterPane Systems. It is a - 16 round block cipher supporting key sizes of 128, 192, and 256 - bits. - - See also: - <http://www.schneier.com/twofish.html> - config CRYPTO_SERPENT tristate "Serpent cipher algorithm" depends on CRYPTO _ Patches currently in -mm which might be from akpm@xxxxxxxx are origin.patch disable-debugging-version-of-write_lock.patch acpi-update-asus_acpi-driver-registration-fix.patch catch-notification-of-memory-add-event-of-acpi-via-container-driver-register-start-func-for-memory-device.patch catch-notification-of-memory-add-event-of-acpi-via-container-driveravoid-redundant-call-add_memory.patch acpi-asus-s3-resume-fix-fix.patch sony_apci-resume.patch git-agpgart.patch kauditd_thread-warning-fix.patch git-cifs.patch usb-move-linux-usb_input.h-to-linux-usb-input-fix.patch i2c-801-64bit-resource-fix.patch git-geode-fixup.patch git-gfs2.patch gfs2-get_sb_dev-fix.patch git-input.patch git-kbuild.patch revert-sparc-build-breakage.patch git-klibc.patch git-klibc-fixup.patch git-hdrcleanup-vs-git-klibc-on-ia64.patch git-hdrcleanup-vs-git-klibc-on-ia64-2.patch libata-reduce-timeouts.patch libatah-needs-scatterlisth.patch sata-is-bust-on-s390.patch forcedeth-typecast-cleanup.patch qla3xxx-is-bust.patch atm-mpcc-warning-fix.patch git-pcmcia-fixup.patch powerpc-kcofnig-warning-fix.patch serial-8250-sysrq-deadlock-fix.patch serial-fix-uart_bug_txen-test.patch revert-gregkh-pci-pci-test-that-drivers-properly-call-pci_set_master.patch clear-abnormal-poweroff-flag-on-via-southbridges-fix-resume-fix.patch areca-raid-linux-scsi-driver.patch git-scsi-target-fixup.patch git-supertrak-fixup.patch pgdat-allocation-for-new-node-add-export-kswapd-start-func-fix.patch adix-tree-rcu-lockless-readside-update-tidy.patch zoned-vm-counters-create-vmstatc-h-from-page_allocc-h-s390-fix.patch zoned-vm-counters-create-vmstatc-h-from-page_allocc-h-fix.patch zoned-vm-counters-basic-zvc-zoned-vm-counter-implementation-tidy.patch zoned-vm-counters-convert-nr_mapped-to-per-zone-counter-fix.patch zoned-vm-counters-remove-nr_file_mapped-from-scan-control-structure-fix.patch zoned-vm-counters-conversion-of-nr_slab-to-per-zone-counter-fix.patch zoned-vm-counters-conversion-of-nr_pagetables-to-per-zone-counter-fix.patch zoned-vm-counters-conversion-of-nr_dirty-to-per-zone-counter-fix.patch zoned-vm-counters-conversion-of-nr_writeback-to-per-zone-counter.patch zoned-vm-counters-conversion-of-nr_writeback-to-per-zone-counter-fix.patch zoned-vm-counters-conversion-of-nr_unstable-to-per-zone-counter-nfs-fix.patch zoned-vm-counters-conversion-of-nr_unstable-to-per-zone-counter-fix.patch zoned-vm-counters-conversion-of-nr_bounce-to-per-zone-counter.patch zoned-vm-counters-conversion-of-nr_bounce-to-per-zone-counter-fix.patch zoned-vm-counters-remove-read_page_state.patch acx1xx-wireless-driver.patch tiacx-pci-build-fix.patch tiacx-ia64-fix.patch i386-moving-phys_proc_id-and-cpu_core_id-to-cpuinfo_x86-warning-fix.patch vdso-randomize-the-i386-vdso-by-moving-it-into-a-vma-tidy.patch vdso-randomize-the-i386-vdso-by-moving-it-into-a-vma-arch_vma_name-fix.patch vdso-randomize-the-i386-vdso-by-moving-it-into-a-vma-vs-x86_64-mm-reliable-stack-trace-support-i386.patch vdso-randomize-the-i386-vdso-by-moving-it-into-a-vma-vs-x86_64-mm-reliable-stack-trace-support-i386-2.patch vdso-randomize-the-i386-vdso-by-moving-it-into-a-vma-vs-x86_64-mm-reliable-stack-trace-support-i386-2-revert-maxmem-change.patch deprecate-smbfs-in-favour-of-cifs.patch add-export_unused_symbol-and-export_unused_symbol_gpl-default.patch load_module-cleanup.patch add-receive_room-flow-control-to-flush_to_ldisc-tidy.patch reiserfs-on-demand-bitmap-loading-fix.patch cpu-hotplug-make-cpu_notifier-related-notifier-calls-__cpuinit-only-fix-fix.patch per-task-delay-accounting-proc-export-of-aggregated-block-i-o-delays-warning-fix.patch add-via-hw-rng-driver-fix.patch add-bcm43xx-hw-rng-support-locking-update.patch hangcheck-remove-monotomic_clock-on-x86.patch sched-fix-smt-nice-lock-contention-and-optimization-tidy.patch swap_prefetch-vs-zoned-counters.patch pi-futex-rt-mutex-tester-fix.patch rtmutex-propagate-priority-settings-into-pi-lock-chains-fix.patch mark-address_space_operations-const-vs-ecryptfs-mmap-operations.patch ecryptfs-alpha-build-fix.patch ecryptfs-more-elegant-aes-key-size-manipulation-tidy.patch ecryptfs-get_sb_dev-fix.patch namespaces-add-nsproxy-dont-include-compileh.patch namespaces-utsname-switch-to-using-uts-namespaces-alpha-fix.patch namespaces-utsname-use-init_utsname-when-appropriate-cifs-update.patch namespaces-utsname-implement-utsname-namespaces-export.patch namespaces-utsname-implement-utsname-namespaces-dont-include-compileh.patch namespaces-utsname-sysctl-hack-cleanup-2-fix.patch ipc-namespace-core-fix.patch task-watchers-task-watchers-tidy.patch task-watchers-add-support-for-per-task-watchers-warning-fix.patch readahead-sysctl-parameters-fix.patch make-copy_from_user_inatomic-not-zero-the-tail-on-i386-vs-reiser4.patch reiser4-hardirq-include-fix.patch reiser4-run-truncate_inode_pages-in-reiser4_delete_inode.patch reiser4-get_sb_dev-fix.patch reiser4-vs-zoned-allocator.patch hpt3xx-rework-rate-filtering-tidy.patch savagefb-add-state-save-and_restore-hooks-tidy.patch au1100fb-add-power-management-support-tidy.patch imacfb-add-intel-based-macintosh-framebuffer-support-tidy.patch vt-binding-add-sysfs-control-to-the-vt-layer-fix.patch lib-add-idr_replace-tidy.patch genirq-rename-desc-handler-to-desc-chip-power-fix.patch genirq-rename-desc-handler-to-desc-chip-ia64-fix.patch genirq-rename-desc-handler-to-desc-chip-ia64-fix-2.patch genirq-rename-desc-handler-to-desc-chip-terminate_irqs-fix.patch genirq-ia64-build-fix.patch - To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html