lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <5e17767f.1c69fb81.73a1d.55bd@mx.google.com>
Date:   Thu, 09 Jan 2020 10:52:46 -0800
From:   Paul Burton <paulburton@...nel.org>
To:     周琰杰 (Zhou Yanjie) 
        <zhouyanjie@...yeetech.com>
CC:     linux-mips@...r.kernel.org
Subject: Re: [PATCH v2] MIPS: X1830: Add X1830 system type.

Hello,

周琰杰 (Zhou Yanjie) wrote:
> 1.Add X1830 system type for cat /proc/cpuinfo to give out X1830.
> 2.Change "PRID_IMP_XBURST" to "PRID_IMP_XBURST_REV1" and add a
>   new "PRID_IMP_XBURST_REV2" for new Ingenic CPUs which has
>   XBurst with MXU2 SIMD ISA.
> 
> Notice:
> 1."PRID_IMP_XBURST_REV2" is corresponds to the latest XBurst
>   processor with 128bit MXU2 SIMD instruction set, not the upcoming
>   XBurst2 processor. This version of the processors fixes issues
>   such as BTB and HPTLB.
> 2.In order to simplify and reuse the code, the "c->cputype" and
>   the "c->writecombine" and the "__cpu_name[cpu]" in the original
>   "PRID_IMP_XBURST" (now is "PRID_IMP_XBURST_REV1") are removed,
>   and the corresponding settings are abtained through fall-through
>   to "PRID_IMP_XBURST_REV2", which will cause the name that was
>   previously mistakenly called "JZRISC" to become to the real name
>   "XBurst".

Applied to mips-next.

> commit b9bb868e2fc1
> https://git.kernel.org/mips/c/b9bb868e2fc1
> 
> Signed-off-by: 周琰杰 (Zhou Yanjie) <zhouyanjie@...yeetech.com>
> Signed-off-by: Paul Burton <paulburton@...nel.org>

Thanks,
    Paul

[ This message was auto-generated; if you believe anything is incorrect
  then please email paulburton@...nel.org to report it. ]

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ