lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20170131160351.GC2821@hector.attlocal.net>
Date:   Tue, 31 Jan 2017 10:03:51 -0600
From:   Andy Gross <andy.gross@...aro.org>
To:     Will Deacon <will.deacon@....com>
Cc:     Olof Johansson <olof@...om.net>,
        Lorenzo Pieralisi <lorenzo.pieralisi@....com>,
        linux-arm-msm <linux-arm-msm@...r.kernel.org>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        Bjorn Andersson <bjorn.andersson@...aro.org>,
        Kevin Hilman <khilman@...libre.com>,
        Russell King <linux@...linux.org.uk>,
        "linux-arm-kernel@...ts.infradead.org" 
        <linux-arm-kernel@...ts.infradead.org>
Subject: Re: [Patch v4 2/2] firmware: qcom: scm: Fix interrupted SCM calls

On Tue, Jan 31, 2017 at 02:45:39PM +0000, Will Deacon wrote:
> On Mon, Jan 30, 2017 at 10:22:18PM -0800, Olof Johansson wrote:
> > On Mon, Jan 30, 2017 at 2:55 AM, Will Deacon <will.deacon@....com> wrote:
> > > On Sun, Jan 29, 2017 at 04:24:51PM -0800, Olof Johansson wrote:
> > >> Seems like a more appropriate change than burden all platforms with
> > >> longer code path due to your quirk.
> > >
> > > I really don't think it's a problem. Do you have numbers suggesting
> > > otherwise?
> > 
> > Not on this first quirk, no.
> > 
> > Anyway, I guess I'm just bikeshedding. You should merge this code if
> > you're happy with it.
> 
> Ok. Andy, does it work for you if I take these two patches via arm64? I'll
> need Russell's ack on the arch/arm/ part.

FYI, there is a new version that fixes an issue with hvc.  I missed this as we
don't exercise that code path.

As for taking it via arm64, that's fine.  I'm not sure how to get his ACK aside
from emailing the patches.


Andy

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ