lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 14 Jan 2020 17:22:48 +0100
From:   Arnd Bergmann <arnd@...db.de>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     Nick Hu <nickhu@...estech.com>, Greentime Hu <green.hu@...il.com>,
        Vincent Chen <deanbo422@...il.com>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Mike Rapoport <rppt@...nel.org>
Subject: asm-generic: fixes for v5.5

The following changes since commit e42617b825f8073569da76dc4510bfa019b1c35a:

  Linux 5.5-rc1 (2019-12-08 14:57:55 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/arnd/playground.git
tags/asm-generic-5.5

for you to fetch changes up to 060dc911501f6ee222569304f50962172a52b1d6:

  nds32: fix build failure caused by page table folding updates
(2019-12-30 11:19:05 +0100)

----------------------------------------------------------------
asm-generic: fixes for v5.5

Here are two bugfixes from Mike Rapoport, both fixing
compile-time errors on the nds32 architecture that
were recently introduced.

Signed-off-by: Arnd Bergmann <arnd@...db.de>

----------------------------------------------------------------
Mike Rapoport (2):
      asm-generic/nds32: don't redefine cacheflush primitives
      nds32: fix build failure caused by page table folding updates

 arch/nds32/include/asm/cacheflush.h | 11 +++++++----
 arch/nds32/include/asm/pgtable.h    |  2 +-
 include/asm-generic/cacheflush.h    | 33 ++++++++++++++++++++++++++++++++-
 3 files changed, 40 insertions(+), 6 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ