Skip to content

Commit fdb5d6c

Browse files
committed
Merge branch 'akpm' (patches from Andrew)
Merge misc fixes from Andrew Morton: "12 patches. Subsystems affected by this patch series: mm (documentation, kasan, and pagemap), csky, ia64, gcov, and lib" * emailed patches from Andrew Morton <akpm@linux-foundation.org>: lib: remove "expecting prototype" kernel-doc warnings gcov: clang: fix clang-11+ build mm: ptdump: fix build failure mm/mapping_dirty_helpers: guard hugepage pud's usage ia64: tools: remove duplicate definition of ia64_mf() on ia64 ia64: tools: remove inclusion of ia64-specific version of errno.h header ia64: fix discontig.c section mismatches ia64: remove duplicate entries in generic_defconfig csky: change a Kconfig symbol name to fix e1000 build error kasan: remove redundant config option kasan: fix hwasan build for gcc mm: eliminate "expecting prototype" kernel-doc warnings
2 parents 9cdbf64 + c95c2d3 commit fdb5d6c

File tree

25 files changed

+66
-59
lines changed

25 files changed

+66
-59
lines changed

arch/arm64/kernel/sleep.S

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ SYM_FUNC_START(_cpu_resume)
134134
*/
135135
bl cpu_do_resume
136136

137-
#if defined(CONFIG_KASAN) && CONFIG_KASAN_STACK
137+
#if defined(CONFIG_KASAN) && defined(CONFIG_KASAN_STACK)
138138
mov x0, sp
139139
bl kasan_unpoison_task_stack_below
140140
#endif

arch/csky/Kconfig

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ config FORCE_MAX_ZONEORDER
314314
int "Maximum zone order"
315315
default "11"
316316

317-
config RAM_BASE
317+
config DRAM_BASE
318318
hex "DRAM start addr (the same with memory-section in dts)"
319319
default 0x0
320320

arch/csky/include/asm/page.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@
2828
#define SSEG_SIZE 0x20000000
2929
#define LOWMEM_LIMIT (SSEG_SIZE * 2)
3030

31-
#define PHYS_OFFSET_OFFSET (CONFIG_RAM_BASE & (SSEG_SIZE - 1))
31+
#define PHYS_OFFSET_OFFSET (CONFIG_DRAM_BASE & (SSEG_SIZE - 1))
3232

3333
#ifndef __ASSEMBLY__
3434

arch/ia64/configs/generic_defconfig

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,6 @@ CONFIG_CHR_DEV_SG=m
5555
CONFIG_SCSI_FC_ATTRS=y
5656
CONFIG_SCSI_SYM53C8XX_2=y
5757
CONFIG_SCSI_QLOGIC_1280=y
58-
CONFIG_ATA=y
59-
CONFIG_ATA_PIIX=y
6058
CONFIG_SATA_VITESSE=y
6159
CONFIG_MD=y
6260
CONFIG_BLK_DEV_MD=m

arch/ia64/mm/discontig.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ static int __init build_node_maps(unsigned long start, unsigned long len,
9595
* acpi_boot_init() (which builds the node_to_cpu_mask array) hasn't been
9696
* called yet. Note that node 0 will also count all non-existent cpus.
9797
*/
98-
static int __meminit early_nr_cpus_node(int node)
98+
static int early_nr_cpus_node(int node)
9999
{
100100
int cpu, n = 0;
101101

@@ -110,7 +110,7 @@ static int __meminit early_nr_cpus_node(int node)
110110
* compute_pernodesize - compute size of pernode data
111111
* @node: the node id.
112112
*/
113-
static unsigned long __meminit compute_pernodesize(int node)
113+
static unsigned long compute_pernodesize(int node)
114114
{
115115
unsigned long pernodesize = 0, cpus;
116116

@@ -367,7 +367,7 @@ static void __init reserve_pernode_space(void)
367367
}
368368
}
369369

370-
static void __meminit scatter_node_data(void)
370+
static void scatter_node_data(void)
371371
{
372372
pg_data_t **dst;
373373
int node;

arch/x86/kernel/acpi/wakeup_64.S

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ SYM_FUNC_START(do_suspend_lowlevel)
115115
movq pt_regs_r14(%rax), %r14
116116
movq pt_regs_r15(%rax), %r15
117117

118-
#if defined(CONFIG_KASAN) && CONFIG_KASAN_STACK
118+
#if defined(CONFIG_KASAN) && defined(CONFIG_KASAN_STACK)
119119
/*
120120
* The suspend path may have poisoned some areas deeper in the stack,
121121
* which we now need to unpoison.

include/linux/kasan.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -330,7 +330,7 @@ static inline bool kasan_check_byte(const void *address)
330330

331331
#endif /* CONFIG_KASAN */
332332

333-
#if defined(CONFIG_KASAN) && CONFIG_KASAN_STACK
333+
#if defined(CONFIG_KASAN) && defined(CONFIG_KASAN_STACK)
334334
void kasan_unpoison_task_stack(struct task_struct *task);
335335
#else
336336
static inline void kasan_unpoison_task_stack(struct task_struct *task) {}

kernel/gcov/clang.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -369,7 +369,7 @@ static struct gcov_fn_info *gcov_fn_info_dup(struct gcov_fn_info *fn)
369369
INIT_LIST_HEAD(&fn_dup->head);
370370

371371
cv_size = fn->num_counters * sizeof(fn->counters[0]);
372-
fn_dup->counters = vmalloc(cv_size);
372+
fn_dup->counters = kvmalloc(cv_size, GFP_KERNEL);
373373
if (!fn_dup->counters) {
374374
kfree(fn_dup);
375375
return NULL;

lib/Kconfig.kasan

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -138,9 +138,10 @@ config KASAN_INLINE
138138

139139
endchoice
140140

141-
config KASAN_STACK_ENABLE
141+
config KASAN_STACK
142142
bool "Enable stack instrumentation (unsafe)" if CC_IS_CLANG && !COMPILE_TEST
143143
depends on KASAN_GENERIC || KASAN_SW_TAGS
144+
default y if CC_IS_GCC
144145
help
145146
The LLVM stack address sanitizer has a know problem that
146147
causes excessive stack usage in a lot of functions, see
@@ -154,12 +155,6 @@ config KASAN_STACK_ENABLE
154155
CONFIG_COMPILE_TEST. On gcc it is assumed to always be safe
155156
to use and enabled by default.
156157

157-
config KASAN_STACK
158-
int
159-
depends on KASAN_GENERIC || KASAN_SW_TAGS
160-
default 1 if KASAN_STACK_ENABLE || CC_IS_GCC
161-
default 0
162-
163158
config KASAN_SW_TAGS_IDENTIFY
164159
bool "Enable memory corruption identification"
165160
depends on KASAN_SW_TAGS

lib/earlycpio.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ enum cpio_fields {
4040
};
4141

4242
/**
43-
* cpio_data find_cpio_data - Search for files in an uncompressed cpio
43+
* find_cpio_data - Search for files in an uncompressed cpio
4444
* @path: The directory to search for, including a slash at the end
4545
* @data: Pointer to the cpio archive or a header inside
4646
* @len: Remaining length of the cpio based on data pointer
@@ -49,7 +49,7 @@ enum cpio_fields {
4949
* matching file itself. It can be used to iterate through the cpio
5050
* to find all files inside of a directory path.
5151
*
52-
* @return: struct cpio_data containing the address, length and
52+
* Return: &struct cpio_data containing the address, length and
5353
* filename (with the directory path cut off) of the found file.
5454
* If you search for a filename and not for files in a directory,
5555
* pass the absolute path of the filename in the cpio and make sure

0 commit comments

Comments
 (0)