+ linux-next-git-rejects.patch added to -mm tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The patch titled
     Subject: linux-next-git-rejects
has been added to the -mm tree.  Its filename is
     linux-next-git-rejects.patch

This patch should soon appear at
    http://ozlabs.org/~akpm/mmots/broken-out/linux-next-git-rejects.patch
and later at
    http://ozlabs.org/~akpm/mmotm/broken-out/linux-next-git-rejects.patch

Before you just go and hit "reply", please:
   a) Consider who else should be cc'ed
   b) Prefer to cc a suitable mailing list as well
   c) Ideally: find the original patch on the mailing list and do a
      reply-to-all to that, adding suitable additional cc's

*** Remember to use Documentation/process/submit-checklist.rst when testing your code ***

The -mm tree is included into linux-next and is updated
there every 3-4 working days

------------------------------------------------------
From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
Subject: linux-next-git-rejects

Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
---

 crypto/crypto_user_base.c            |   65 -------------------------
 crypto/crypto_user_stat.c            |   47 ------------------
 drivers/gpu/drm/i915/intel_display.c |    8 ---
 drivers/gpu/drm/i915/intel_hotplug.c |    7 --
 drivers/gpu/drm/i915/intel_sprite.c  |   32 ------------
 drivers/scsi/scsi_lib.c              |   35 -------------
 6 files changed, 194 deletions(-)

--- a/crypto/crypto_user_base.c~linux-next-git-rejects
+++ a/crypto/crypto_user_base.c
@@ -84,13 +84,9 @@ static int crypto_report_cipher(struct s
 {
 	struct crypto_report_cipher rcipher;
 
-<<<<<<< HEAD
-	strncpy(rcipher.type, "cipher", sizeof(rcipher.type));
-=======
 	memset(&rcipher, 0, sizeof(rcipher));
 
 	strscpy(rcipher.type, "cipher", sizeof(rcipher.type));
->>>>>>> linux-next/akpm-base
 
 	rcipher.blocksize = alg->cra_blocksize;
 	rcipher.min_keysize = alg->cra_cipher.cia_min_keysize;
@@ -104,55 +100,7 @@ static int crypto_report_comp(struct sk_
 {
 	struct crypto_report_comp rcomp;
 
-<<<<<<< HEAD
-	strncpy(rcomp.type, "compression", sizeof(rcomp.type));
-	if (nla_put(skb, CRYPTOCFGA_REPORT_COMPRESS,
-		    sizeof(struct crypto_report_comp), &rcomp))
-		goto nla_put_failure;
-	return 0;
-
-nla_put_failure:
-	return -EMSGSIZE;
-}
-
-static int crypto_report_acomp(struct sk_buff *skb, struct crypto_alg *alg)
-{
-	struct crypto_report_acomp racomp;
-
-	strncpy(racomp.type, "acomp", sizeof(racomp.type));
-
-	if (nla_put(skb, CRYPTOCFGA_REPORT_ACOMP,
-		    sizeof(struct crypto_report_acomp), &racomp))
-		goto nla_put_failure;
-	return 0;
-
-nla_put_failure:
-	return -EMSGSIZE;
-}
-
-static int crypto_report_akcipher(struct sk_buff *skb, struct crypto_alg *alg)
-{
-	struct crypto_report_akcipher rakcipher;
-
-	strncpy(rakcipher.type, "akcipher", sizeof(rakcipher.type));
-
-	if (nla_put(skb, CRYPTOCFGA_REPORT_AKCIPHER,
-		    sizeof(struct crypto_report_akcipher), &rakcipher))
-		goto nla_put_failure;
-	return 0;
-
-nla_put_failure:
-	return -EMSGSIZE;
-}
-
-static int crypto_report_kpp(struct sk_buff *skb, struct crypto_alg *alg)
-{
-	struct crypto_report_kpp rkpp;
-
-	strncpy(rkpp.type, "kpp", sizeof(rkpp.type));
-=======
 	memset(&rcomp, 0, sizeof(rcomp));
->>>>>>> linux-next/akpm-base
 
 	strscpy(rcomp.type, "compression", sizeof(rcomp.type));
 
@@ -162,19 +110,12 @@ static int crypto_report_kpp(struct sk_b
 static int crypto_report_one(struct crypto_alg *alg,
 			     struct crypto_user_alg *ualg, struct sk_buff *skb)
 {
-<<<<<<< HEAD
-	strncpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
-	strncpy(ualg->cru_driver_name, alg->cra_driver_name,
-		sizeof(ualg->cru_driver_name));
-	strncpy(ualg->cru_module_name, module_name(alg->cra_module),
-=======
 	memset(ualg, 0, sizeof(*ualg));
 
 	strscpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
 	strscpy(ualg->cru_driver_name, alg->cra_driver_name,
 		sizeof(ualg->cru_driver_name));
 	strscpy(ualg->cru_module_name, module_name(alg->cra_module),
->>>>>>> linux-next/akpm-base
 		sizeof(ualg->cru_module_name));
 
 	ualg->cru_type = 0;
@@ -187,15 +128,9 @@ static int crypto_report_one(struct cryp
 	if (alg->cra_flags & CRYPTO_ALG_LARVAL) {
 		struct crypto_report_larval rl;
 
-<<<<<<< HEAD
-		strncpy(rl.type, "larval", sizeof(rl.type));
-		if (nla_put(skb, CRYPTOCFGA_REPORT_LARVAL,
-			    sizeof(struct crypto_report_larval), &rl))
-=======
 		memset(&rl, 0, sizeof(rl));
 		strscpy(rl.type, "larval", sizeof(rl.type));
 		if (nla_put(skb, CRYPTOCFGA_REPORT_LARVAL, sizeof(rl), &rl))
->>>>>>> linux-next/akpm-base
 			goto nla_put_failure;
 		goto out;
 	}
--- a/crypto/crypto_user_stat.c~linux-next-git-rejects
+++ a/crypto/crypto_user_stat.c
@@ -39,11 +39,7 @@ static int crypto_report_aead(struct sk_
 
 	memset(&raead, 0, sizeof(raead));
 
-<<<<<<< HEAD
-	strncpy(raead.type, "aead", sizeof(raead.type));
-=======
 	strscpy(raead.type, "aead", sizeof(raead.type));
->>>>>>> linux-next/akpm-base
 
 	v32 = atomic_read(&alg->encrypt_cnt);
 	raead.stat_encrypt_cnt = v32;
@@ -67,11 +63,7 @@ static int crypto_report_cipher(struct s
 
 	memset(&rcipher, 0, sizeof(rcipher));
 
-<<<<<<< HEAD
-	strlcpy(rcipher.type, "cipher", sizeof(rcipher.type));
-=======
 	strscpy(rcipher.type, "cipher", sizeof(rcipher.type));
->>>>>>> linux-next/akpm-base
 
 	v32 = atomic_read(&alg->encrypt_cnt);
 	rcipher.stat_encrypt_cnt = v32;
@@ -95,11 +87,7 @@ static int crypto_report_comp(struct sk_
 
 	memset(&rcomp, 0, sizeof(rcomp));
 
-<<<<<<< HEAD
-	strlcpy(rcomp.type, "compression", sizeof(rcomp.type));
-=======
 	strscpy(rcomp.type, "compression", sizeof(rcomp.type));
->>>>>>> linux-next/akpm-base
 	v32 = atomic_read(&alg->compress_cnt);
 	rcomp.stat_compress_cnt = v32;
 	v64 = atomic64_read(&alg->compress_tlen);
@@ -122,11 +110,7 @@ static int crypto_report_acomp(struct sk
 
 	memset(&racomp, 0, sizeof(racomp));
 
-<<<<<<< HEAD
-	strlcpy(racomp.type, "acomp", sizeof(racomp.type));
-=======
 	strscpy(racomp.type, "acomp", sizeof(racomp.type));
->>>>>>> linux-next/akpm-base
 	v32 = atomic_read(&alg->compress_cnt);
 	racomp.stat_compress_cnt = v32;
 	v64 = atomic64_read(&alg->compress_tlen);
@@ -149,11 +133,7 @@ static int crypto_report_akcipher(struct
 
 	memset(&rakcipher, 0, sizeof(rakcipher));
 
-<<<<<<< HEAD
-	strncpy(rakcipher.type, "akcipher", sizeof(rakcipher.type));
-=======
 	strscpy(rakcipher.type, "akcipher", sizeof(rakcipher.type));
->>>>>>> linux-next/akpm-base
 	v32 = atomic_read(&alg->encrypt_cnt);
 	rakcipher.stat_encrypt_cnt = v32;
 	v64 = atomic64_read(&alg->encrypt_tlen);
@@ -180,11 +160,7 @@ static int crypto_report_kpp(struct sk_b
 
 	memset(&rkpp, 0, sizeof(rkpp));
 
-<<<<<<< HEAD
-	strlcpy(rkpp.type, "kpp", sizeof(rkpp.type));
-=======
 	strscpy(rkpp.type, "kpp", sizeof(rkpp.type));
->>>>>>> linux-next/akpm-base
 
 	v = atomic_read(&alg->setsecret_cnt);
 	rkpp.stat_setsecret_cnt = v;
@@ -206,11 +182,7 @@ static int crypto_report_ahash(struct sk
 
 	memset(&rhash, 0, sizeof(rhash));
 
-<<<<<<< HEAD
-	strncpy(rhash.type, "ahash", sizeof(rhash.type));
-=======
 	strscpy(rhash.type, "ahash", sizeof(rhash.type));
->>>>>>> linux-next/akpm-base
 
 	v32 = atomic_read(&alg->hash_cnt);
 	rhash.stat_hash_cnt = v32;
@@ -230,11 +202,7 @@ static int crypto_report_shash(struct sk
 
 	memset(&rhash, 0, sizeof(rhash));
 
-<<<<<<< HEAD
-	strncpy(rhash.type, "shash", sizeof(rhash.type));
-=======
 	strscpy(rhash.type, "shash", sizeof(rhash.type));
->>>>>>> linux-next/akpm-base
 
 	v32 = atomic_read(&alg->hash_cnt);
 	rhash.stat_hash_cnt = v32;
@@ -254,11 +222,7 @@ static int crypto_report_rng(struct sk_b
 
 	memset(&rrng, 0, sizeof(rrng));
 
-<<<<<<< HEAD
-	strncpy(rrng.type, "rng", sizeof(rrng.type));
-=======
 	strscpy(rrng.type, "rng", sizeof(rrng.type));
->>>>>>> linux-next/akpm-base
 
 	v32 = atomic_read(&alg->generate_cnt);
 	rrng.stat_generate_cnt = v32;
@@ -278,13 +242,8 @@ static int crypto_reportstat_one(struct
 {
 	memset(ualg, 0, sizeof(*ualg));
 
-<<<<<<< HEAD
-	strlcpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
-	strlcpy(ualg->cru_driver_name, alg->cra_driver_name,
-=======
 	strscpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
 	strscpy(ualg->cru_driver_name, alg->cra_driver_name,
->>>>>>> linux-next/akpm-base
 		sizeof(ualg->cru_driver_name));
 	strscpy(ualg->cru_module_name, module_name(alg->cra_module),
 		sizeof(ualg->cru_module_name));
@@ -300,14 +259,8 @@ static int crypto_reportstat_one(struct
 		struct crypto_stat rl;
 
 		memset(&rl, 0, sizeof(rl));
-<<<<<<< HEAD
-		strlcpy(rl.type, "larval", sizeof(rl.type));
-		if (nla_put(skb, CRYPTOCFGA_STAT_LARVAL,
-			    sizeof(struct crypto_stat), &rl))
-=======
 		strscpy(rl.type, "larval", sizeof(rl.type));
 		if (nla_put(skb, CRYPTOCFGA_STAT_LARVAL, sizeof(rl), &rl))
->>>>>>> linux-next/akpm-base
 			goto nla_put_failure;
 		goto out;
 	}
--- a/drivers/gpu/drm/i915/intel_display.c~linux-next-git-rejects
+++ a/drivers/gpu/drm/i915/intel_display.c
@@ -5032,19 +5032,11 @@ static void skylake_pfit_enable(const st
 		if (WARN_ON(crtc_state->scaler_state.scaler_id < 0))
 			return;
 
-<<<<<<< HEAD
-		pfit_w = (crtc->config->pch_pfit.size >> 16) & 0xFFFF;
-		pfit_h = crtc->config->pch_pfit.size & 0xFFFF;
-
-		hscale = (crtc->config->pipe_src_w << 16) / pfit_w;
-		vscale = (crtc->config->pipe_src_h << 16) / pfit_h;
-=======
 		pfit_w = (crtc_state->pch_pfit.size >> 16) & 0xFFFF;
 		pfit_h = crtc_state->pch_pfit.size & 0xFFFF;
 
 		hscale = (crtc_state->pipe_src_w << 16) / pfit_w;
 		vscale = (crtc_state->pipe_src_h << 16) / pfit_h;
->>>>>>> linux-next/akpm-base
 
 		uv_rgb_hphase = skl_scaler_calc_phase(1, hscale, false);
 		uv_rgb_vphase = skl_scaler_calc_phase(1, vscale, false);
--- a/drivers/gpu/drm/i915/intel_hotplug.c~linux-next-git-rejects
+++ a/drivers/gpu/drm/i915/intel_hotplug.c
@@ -491,14 +491,7 @@ void intel_hpd_irq_handler(struct drm_i9
 			queue_hp = true;
 		}
 
-<<<<<<< HEAD
-		if (!long_hpd)
-			continue;
-
-		if (intel_hpd_irq_storm_detect(dev_priv, pin)) {
-=======
 		if (intel_hpd_irq_storm_detect(dev_priv, pin, long_hpd)) {
->>>>>>> linux-next/akpm-base
 			dev_priv->hotplug.event_bits &= ~BIT(pin);
 			storm_detected = true;
 			queue_hp = true;
--- a/drivers/gpu/drm/i915/intel_sprite.c~linux-next-git-rejects
+++ a/drivers/gpu/drm/i915/intel_sprite.c
@@ -336,12 +336,8 @@ skl_program_scaler(struct intel_plane *p
 				      0, INT_MAX);
 
 	/* TODO: handle sub-pixel coordinates */
-<<<<<<< HEAD
-	if (plane_state->base.fb->format->format == DRM_FORMAT_NV12) {
-=======
 	if (plane_state->base.fb->format->format == DRM_FORMAT_NV12 &&
 	    !icl_is_hdr_plane(plane)) {
->>>>>>> linux-next/akpm-base
 		y_hphase = skl_scaler_calc_phase(1, hscale, false);
 		y_vphase = skl_scaler_calc_phase(1, vscale, false);
 
@@ -359,10 +355,6 @@ skl_program_scaler(struct intel_plane *p
 
 	I915_WRITE_FW(SKL_PS_CTRL(pipe, scaler_id),
 		      PS_SCALER_EN | PS_PLANE_SEL(plane->id) | scaler->mode);
-<<<<<<< HEAD
-	I915_WRITE_FW(SKL_PS_PWR_GATE(pipe, scaler_id), 0);
-=======
->>>>>>> linux-next/akpm-base
 	I915_WRITE_FW(SKL_PS_VPHASE(pipe, scaler_id),
 		      PS_Y_PHASE(y_vphase) | PS_UV_RGB_PHASE(uv_rgb_vphase));
 	I915_WRITE_FW(SKL_PS_HPHASE(pipe, scaler_id),
@@ -371,12 +363,6 @@ skl_program_scaler(struct intel_plane *p
 	I915_WRITE_FW(SKL_PS_WIN_SZ(pipe, scaler_id), (crtc_w << 16) | crtc_h);
 }
 
-<<<<<<< HEAD
-void
-skl_update_plane(struct intel_plane *plane,
-		 const struct intel_crtc_state *crtc_state,
-		 const struct intel_plane_state *plane_state)
-=======
 /* Preoffset values for YUV to RGB Conversion */
 #define PREOFF_YUV_TO_RGB_HI		0x1800
 #define PREOFF_YUV_TO_RGB_ME		0x1F00
@@ -484,7 +470,6 @@ skl_program_plane(struct intel_plane *pl
 		  const struct intel_crtc_state *crtc_state,
 		  const struct intel_plane_state *plane_state,
 		  int color_plane, bool slave, u32 plane_ctl)
->>>>>>> linux-next/akpm-base
 {
 	struct drm_i915_private *dev_priv = to_i915(plane->base.dev);
 	enum plane_id plane_id = plane->id;
@@ -495,13 +480,8 @@ skl_program_plane(struct intel_plane *pl
 	u32 aux_stride = skl_plane_stride(plane_state, 1);
 	int crtc_x = plane_state->base.dst.x1;
 	int crtc_y = plane_state->base.dst.y1;
-<<<<<<< HEAD
-	uint32_t x = plane_state->color_plane[0].x;
-	uint32_t y = plane_state->color_plane[0].y;
-=======
 	uint32_t x = plane_state->color_plane[color_plane].x;
 	uint32_t y = plane_state->color_plane[color_plane].y;
->>>>>>> linux-next/akpm-base
 	uint32_t src_w = drm_rect_width(&plane_state->base.src) >> 16;
 	uint32_t src_h = drm_rect_height(&plane_state->base.src) >> 16;
 	struct intel_plane *linked = plane_state->linked_plane;
@@ -513,8 +493,6 @@ skl_program_plane(struct intel_plane *pl
 	/* Sizes are 0 based */
 	src_w--;
 	src_h--;
-<<<<<<< HEAD
-=======
 
 	keymax = (key->max_value & 0xffffff) | PLANE_KEYMAX_ALPHA(alpha);
 
@@ -527,7 +505,6 @@ skl_program_plane(struct intel_plane *pl
 		crtc_x = 0;
 		crtc_y = 0;
 	}
->>>>>>> linux-next/akpm-base
 
 	spin_lock_irqsave(&dev_priv->uncore.lock, irqflags);
 
@@ -548,14 +525,6 @@ skl_program_plane(struct intel_plane *pl
 	I915_WRITE_FW(PLANE_AUX_DIST(pipe, plane_id),
 		      (plane_state->color_plane[1].offset - surf_addr) | aux_stride);
 
-<<<<<<< HEAD
-	if (plane_state->scaler_id >= 0) {
-		skl_program_scaler(plane, crtc_state, plane_state);
-
-		I915_WRITE_FW(PLANE_POS(pipe, plane_id), 0);
-	} else {
-		I915_WRITE_FW(PLANE_POS(pipe, plane_id), (crtc_y << 16) | crtc_x);
-=======
 	if (INTEL_GEN(dev_priv) < 11)
 		I915_WRITE_FW(PLANE_AUX_OFFSET(pipe, plane_id),
 			      (plane_state->color_plane[1].y << 16) |
@@ -580,7 +549,6 @@ skl_program_plane(struct intel_plane *pl
 		}
 
 		I915_WRITE_FW(PLANE_CUS_CTL(pipe, plane_id), cus_ctl);
->>>>>>> linux-next/akpm-base
 	}
 
 	if (!slave && plane_state->scaler_id >= 0)
--- a/drivers/scsi/scsi_lib.c~linux-next-git-rejects
+++ a/drivers/scsi/scsi_lib.c
@@ -601,40 +601,6 @@ static bool scsi_end_request(struct requ
 		destroy_rcu_head(&cmd->rcu);
 	}
 
-<<<<<<< HEAD
-	if (req->mq_ctx) {
-		/*
-		 * In the MQ case the command gets freed by __blk_mq_end_request,
-		 * so we have to do all cleanup that depends on it earlier.
-		 *
-		 * We also can't kick the queues from irq context, so we
-		 * will have to defer it to a workqueue.
-		 */
-		scsi_mq_uninit_cmd(cmd);
-
-		/*
-		 * queue is still alive, so grab the ref for preventing it
-		 * from being cleaned up during running queue.
-		 */
-		percpu_ref_get(&q->q_usage_counter);
-
-		__blk_mq_end_request(req, error);
-
-		if (scsi_target(sdev)->single_lun ||
-		    !list_empty(&sdev->host->starved_list))
-			kblockd_schedule_work(&sdev->requeue_work);
-		else
-			blk_mq_run_hw_queues(q, true);
-
-		percpu_ref_put(&q->q_usage_counter);
-	} else {
-		unsigned long flags;
-
-		if (bidi_bytes)
-			scsi_release_bidi_buffers(cmd);
-		scsi_release_buffers(cmd);
-		scsi_put_command(cmd);
-=======
 	/*
 	 * In the MQ case the command gets freed by __blk_mq_end_request,
 	 * so we have to do all cleanup that depends on it earlier.
@@ -643,7 +609,6 @@ static bool scsi_end_request(struct requ
 	 * will have to defer it to a workqueue.
 	 */
 	scsi_mq_uninit_cmd(cmd);
->>>>>>> linux-next/akpm-base
 
 	__blk_mq_end_request(req, error);
 
_

Patches currently in -mm which might be from akpm@xxxxxxxxxxxxxxxxxxxx are

mm-cleancache-fix-corruption-on-missed-inode-invalidation-fix.patch
arm-arch-arm-include-asm-pageh-needs-personalityh.patch
mm.patch
mm-slab-remove-unnecessary-unlikely-fix.patch
mm-slub-record-final-state-of-slub-action-in-deactivate_slab-fix.patch
mm-page_owner-clamp-read-count-to-page_size-fix.patch
mm-hotplug-optimize-clear_hwpoisoned_pages-fix.patch
mm-ksm-do-not-block-on-page-lock-when-searching-stable-tree-fix.patch
mm-memory_hotplug-print-reason-for-the-offlining-failure-fix.patch
mm-memory_hotplug-be-more-verbose-for-memory-offline-failures-fix.patch
mm-convert-totalram_pages-and-totalhigh_pages-variables-to-atomic-checkpatch-fixes.patch
memory_hotplug-free-pages-as-higher-order-fix.patch
memory_hotplug-free-pages-as-higher-order-fix-fix.patch
fs-epoll-deal-with-wait_queue-only-once-fix.patch
exec-separate-mm_anonpages-and-rlimit_stack-accounting-checkpatch-fixes.patch
ipc-allow-boot-time-extension-of-ipcmni-from-32k-to-8m-checkpatch-fixes.patch
linux-next-git-rejects.patch
scripts-atomic-check-atomicssh-dont-assume-that-scripts-are-executable.patch
drivers-net-ethernet-qlogic-qed-qed_rdmah-fix-typo.patch
kernel-forkc-export-kernel_thread-to-modules.patch
slab-leaks3-default-y.patch




[Index of Archives]     [Kernel Archive]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]

  Powered by Linux