Merge branch 'akpm' (second patchbomb from Andrew Morton)
Merge more incoming from Andrew Morton: "Two new syscalls: memfd_create in "shm: add memfd_create() syscall" kexec_file_load in "kexec: implementation of new syscall kexec_file_load" And: - Most (all?) of the rest of MM - Lots of the usual misc bits - fs/autofs4 - drivers/rtc - fs/nilfs - procfs - fork.c, exec.c - more in lib/ - rapidio - Janitorial work in filesystems: fs/ufs, fs/reiserfs, fs/adfs, fs/cramfs, fs/romfs, fs/qnx6. - initrd/initramfs work - "file sealing" and the memfd_create() syscall, in tmpfs - add pci_zalloc_consistent, use it in lots of places - MAINTAINERS maintenance - kexec feature work" * emailed patches from Andrew Morton <akpm@linux-foundation.org: (193 commits) MAINTAINERS: update nomadik patterns MAINTAINERS: update usb/gadget patterns MAINTAINERS: update DMA BUFFER SHARING patterns kexec: verify the signature of signed PE bzImage kexec: support kexec/kdump on EFI systems kexec: support for kexec on panic using new system call kexec-bzImage64: support for loading bzImage using 64bit entry kexec: load and relocate purgatory at kernel load time purgatory: core purgatory functionality purgatory/sha256: provide implementation of sha256 in purgaotory context kexec: implementation of new syscall kexec_file_load kexec: new syscall kexec_file_load() declaration kexec: make kexec_segment user buffer pointer a union resource: provide new functions to walk through resources kexec: use common function for kimage_normal_alloc() and kimage_crash_alloc() kexec: move segment verification code in a separate function kexec: rename unusebale_pages to unusable_pages kernel: build bin2c based on config option CONFIG_BUILD_BIN2C bin2c: move bin2c in scripts/basic shm: wait for pins to be released when sealing ...
This commit is contained in:
@@ -336,7 +336,7 @@ static int __init early_touchbook_revision(char *p)
|
||||
if (!p)
|
||||
return 0;
|
||||
|
||||
return strict_strtoul(p, 10, &touchbook_revision);
|
||||
return kstrtoul(p, 10, &touchbook_revision);
|
||||
}
|
||||
early_param("tbr", early_touchbook_revision);
|
||||
|
||||
|
@@ -681,29 +681,19 @@ static ssize_t omap_mux_dbg_signal_write(struct file *file,
|
||||
const char __user *user_buf,
|
||||
size_t count, loff_t *ppos)
|
||||
{
|
||||
char buf[OMAP_MUX_MAX_ARG_CHAR];
|
||||
struct seq_file *seqf;
|
||||
struct omap_mux *m;
|
||||
unsigned long val;
|
||||
int buf_size, ret;
|
||||
u16 val;
|
||||
int ret;
|
||||
struct omap_mux_partition *partition;
|
||||
|
||||
if (count > OMAP_MUX_MAX_ARG_CHAR)
|
||||
return -EINVAL;
|
||||
|
||||
memset(buf, 0, sizeof(buf));
|
||||
buf_size = min(count, sizeof(buf) - 1);
|
||||
|
||||
if (copy_from_user(buf, user_buf, buf_size))
|
||||
return -EFAULT;
|
||||
|
||||
ret = strict_strtoul(buf, 0x10, &val);
|
||||
ret = kstrtou16_from_user(user_buf, count, 0x10, &val);
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
|
||||
if (val > 0xffff)
|
||||
return -EINVAL;
|
||||
|
||||
seqf = file->private_data;
|
||||
m = seqf->private;
|
||||
|
||||
@@ -711,7 +701,7 @@ static ssize_t omap_mux_dbg_signal_write(struct file *file,
|
||||
if (!partition)
|
||||
return -ENODEV;
|
||||
|
||||
omap_mux_write(partition, (u16)val, m->reg_offset);
|
||||
omap_mux_write(partition, val, m->reg_offset);
|
||||
*ppos += count;
|
||||
|
||||
return count;
|
||||
@@ -917,14 +907,14 @@ static void __init omap_mux_set_cmdline_signals(void)
|
||||
|
||||
while ((token = strsep(&next_opt, ",")) != NULL) {
|
||||
char *keyval, *name;
|
||||
unsigned long val;
|
||||
u16 val;
|
||||
|
||||
keyval = token;
|
||||
name = strsep(&keyval, "=");
|
||||
if (name) {
|
||||
int res;
|
||||
|
||||
res = strict_strtoul(keyval, 0x10, &val);
|
||||
res = kstrtou16(keyval, 0x10, &val);
|
||||
if (res < 0)
|
||||
continue;
|
||||
|
||||
|
Reference in New Issue
Block a user