From patchwork Mon Nov 28 01:29:55 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stephen Rothwell X-Patchwork-Id: 26444 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:f944:0:0:0:0:0 with SMTP id q4csp5377541wrr; Sun, 27 Nov 2022 17:36:46 -0800 (PST) X-Google-Smtp-Source: AA0mqf4Gv5i6Zf1oxksggngqEYxGS4jfzJTysQ39cMj2SSnkrCgBqtGUzjdV2fvLvPdJjmar2KeJ X-Received: by 2002:a63:67c2:0:b0:46f:d2d4:bac4 with SMTP id b185-20020a6367c2000000b0046fd2d4bac4mr43072206pgc.178.1669599406479; Sun, 27 Nov 2022 17:36:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669599406; cv=none; d=google.com; s=arc-20160816; b=0Sc4zmKL25OBpCPHznv1k8JDh9eq1BPsBuHgK5FCcUySpKrSU4dU/21nwMng0BEZJh i+1AkbFZAWJ9Lb3cPePTr8BUGfqEneRC76Focujm3jXHI/6+nbUNQCFUqzHdXuua3pMn xbIhvaagINOkhw/wO5iBRlTX0QnF2u+8zr30Vh1gpJRx6yNlzmp2+i1xNJZhq6nvAk6t Qv1lr5YvpxoCHXefz59R3oSlzXayKomf3fL+sh3bNMSuO0pT8EbLOZqGEFN3dEwTETHk o0wAU5hAeOifigxFUZqR++HC8Ig4UfpPkArIrwqA2yWJYF/CNlXtoCMLqbGYx/61PNck wRAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:subject:cc:to:from:date :dkim-signature; bh=ZRRd6Gk8NWLzfHY82OUx4YCkMM3vE3XCFIJ8nTVL9TY=; b=xGvw4DIIzM/cnZ0j+c4/4pQ2PXkl8rW+HA4q6NLzn0BodyYv8yasrqoxcHwDAIeIHT 6n6Q9gqxXQ9tQRu6Ql1g393to7+pnfriPwzWZfswIO4AvBIQR8pAJADH9J3+e7m94tUe /ahdlk7DEgxuCoBYyZ/8g/r/8hRNE88PvSdyzvGCQxF2GXi4/VvcwiZRgRy63XnTu0uW JpDvqrfekvCAFUGO2OIzTKjJcANN8+044LrXkeoTfnzcnNdxjGigscEPdkOP8ami0Iqq qZ+TbCJCN1rClEOqc8yBDYeLZSnLGAn++gw2bIoSTw2RLmCfaNfgv8M5PwYCJFjYipK3 EY0A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canb.auug.org.au header.s=201702 header.b=cS+hEbvS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w14-20020a170902e88e00b00186e9ff4edcsi11859788plg.408.2022.11.27.17.36.32; Sun, 27 Nov 2022 17:36:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@canb.auug.org.au header.s=201702 header.b=cS+hEbvS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229677AbiK1BaF (ORCPT + 99 others); Sun, 27 Nov 2022 20:30:05 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45418 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229475AbiK1BaE (ORCPT ); Sun, 27 Nov 2022 20:30:04 -0500 Received: from gandalf.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BED70A45A; Sun, 27 Nov 2022 17:30:02 -0800 (PST) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4NL7F03kRbz4x7X; Mon, 28 Nov 2022 12:29:56 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canb.auug.org.au; s=201702; t=1669598997; bh=ZRRd6Gk8NWLzfHY82OUx4YCkMM3vE3XCFIJ8nTVL9TY=; h=Date:From:To:Cc:Subject:From; b=cS+hEbvSamFGFXQYcxoSOG7KKcbDzq4/3Owjw72mEtzEzmf9AT9+VG7C86mfK01hn hIAGAbDmlpuqFqmevr/rMrpfwAkPhiIg4oPhR4wlsze1CC/2pGjJIM07yzW0VYWJka bk+3l3ragKov1J8uICwP5sqifWX8QQT/vgcsjUb+FvHI3rOD53VQSEHXDAzaoGfH0k pVJoV9JQ1mRf0Iaz8l1n0fcWRk267Yh6f+j1g5v2+Ppzf1BI+zRuR5x1vE+DlaGGbs 51O5JNUVvnuWbX7i3WHwTgP/DjD7NoifNoqo94lr0QiAY7U38UHAX9uJWnJB/NrAtv xEId8sqGQADuw== Date: Mon, 28 Nov 2022 12:29:55 +1100 From: Stephen Rothwell To: Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Peter Zijlstra , Herbert Xu Cc: Linux Crypto List , Eric Biggers , Linux Kernel Mailing List , Linux Next Mailing List Subject: linux-next: manual merge of the tip tree with the crypto tree Message-ID: <20221128122955.2f946b91@canb.auug.org.au> MIME-Version: 1.0 X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_MED,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1750701867001191808?= X-GMAIL-MSGID: =?utf-8?q?1750701867001191808?= Hi all, Today's linux-next merge of the tip tree got conflicts in: arch/x86/crypto/sha1_ni_asm.S arch/x86/crypto/sha256-avx-asm.S arch/x86/crypto/sha256-avx2-asm.S arch/x86/crypto/sha256-ssse3-asm.S arch/x86/crypto/sha256_ni_asm.S arch/x86/crypto/sm3-avx-asm_64.S arch/x86/crypto/sm4-aesni-avx-asm_64.S arch/x86/crypto/sm4-aesni-avx2-asm_64.S between commits: 32f34bf7e44e ("crypto: x86/sha1 - fix possible crash with CFI enabled") 19940ebbb59c ("crypto: x86/sha256 - fix possible crash with CFI enabled") 8ba490d9f5a5 ("crypto: x86/sm3 - fix possible crash with CFI enabled") 2d203c46a0fa ("crypto: x86/sm4 - fix crash with CFI enabled") from the crypto tree and commits: c2a3ce6fdb12 ("crypto: x86/sha1: Remove custom alignments") 3ba56d0b8711 ("crypto: x86/sha256: Remove custom alignments") 2f93238b87dd ("crypto: x86/sm[34]: Remove redundant alignments") from the tip tree. I fixed it up (see below) and can carry the fix as necessary. This is now fixed as far as linux-next is concerned, but any non trivial conflicts should be mentioned to your upstream maintainer when your tree is submitted for merging. You may also want to consider cooperating with the maintainer of the conflicting tree to minimise any particularly complex conflicts. diff --cc arch/x86/crypto/sha1_ni_asm.S index 3cae5a1bb3d6,cd943b2af2c4..000000000000 --- a/arch/x86/crypto/sha1_ni_asm.S diff --cc arch/x86/crypto/sha256-avx-asm.S index 06ea30c20828,3649370690c5..000000000000 --- a/arch/x86/crypto/sha256-avx-asm.S diff --cc arch/x86/crypto/sha256-avx2-asm.S index 2d2be531a11e,c4c1dc5ee078..000000000000 --- a/arch/x86/crypto/sha256-avx2-asm.S diff --cc arch/x86/crypto/sha256-ssse3-asm.S index 7db28839108d,96b7dcdeaebe..000000000000 --- a/arch/x86/crypto/sha256-ssse3-asm.S diff --cc arch/x86/crypto/sha256_ni_asm.S index 47f93937f798,b3f1a1a12027..000000000000 --- a/arch/x86/crypto/sha256_ni_asm.S diff --cc arch/x86/crypto/sm3-avx-asm_64.S index 8fc5ac681fd6,b28d804ee10d..000000000000 --- a/arch/x86/crypto/sm3-avx-asm_64.S diff --cc arch/x86/crypto/sm4-aesni-avx-asm_64.S index 22b6560eb9e1,e13c8537b2ec..000000000000 --- a/arch/x86/crypto/sm4-aesni-avx-asm_64.S diff --cc arch/x86/crypto/sm4-aesni-avx2-asm_64.S index 23ee39a8ada8,2212705f7da6..000000000000 --- a/arch/x86/crypto/sm4-aesni-avx2-asm_64.S