lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 22 May 2014 17:53:56 -0400 (EDT)
From:	David Miller <>
Subject: [GIT] Sparc

A small bunch of bug fixes, in particular:

1) On older cpus we need a different chunk of virtual address
   space to map the huge page TSB.

2) Missing memory barrier in Niagara2 memcpy.

3) trinity showed some places where fault validation was unnecessarily
   loud on sparc64

4) Some sysfs printf's need a type adjustment, from Toralf Förster

Please pull, thanks a lot.

The following changes since commit 256cf4c438e60116785a83b060614c63c7477e84:

  Merge branch 'for-linus' of git:// (2014-05-06 09:09:35 -0700)

are available in the git repository at:

  git:// master

for you to fetch changes up to 8ecc1bad4c9b485ceb47182d282980d0b0fe20ac:

  sparc64: fix format string mismatch in arch/sparc/kernel/sysfs.c (2014-05-21 12:54:42 -0700)

David S. Miller (3):
      sparc64: Don't bark so loudly about 32-bit tasks generating 64-bit fault addresses.
      sparc64: Fix huge TSB mapping on pre-UltraSPARC-III cpus.
      sparc64: Add membar to Niagara2 memcpy code.

Toralf Förster (1):
      sparc64: fix format string mismatch in arch/sparc/kernel/sysfs.c

 arch/sparc/include/asm/pgtable_64.h |  6 ++++--
 arch/sparc/kernel/sysfs.c           |  2 +-
 arch/sparc/lib/NG2memcpy.S          |  1 +
 arch/sparc/mm/fault_64.c            | 16 +---------------
 arch/sparc/mm/tsb.c                 | 14 +++++++++++++-
 5 files changed, 20 insertions(+), 19 deletions(-)
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
More majordomo info at
Please read the FAQ at

Powered by blists - more mailing lists