lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <AM0PR0402MB3809CD2049E4B97ECC8A362CAE440@AM0PR0402MB3809.eurprd04.prod.outlook.com>
Date:   Mon, 10 Aug 2020 06:20:22 +0000
From:   Jason Liu <jason.hui.liu@....com>
To:     Oliver Graute <oliver.graute@...il.com>
CC:     Anson Huang <anson.huang@....com>,
        Aisheng Dong <aisheng.dong@....com>,
        "catalin.marinas@....com" <catalin.marinas@....com>,
        "will@...nel.org" <will@...nel.org>,
        dl-linux-imx <linux-imx@....com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: RE: arm64: imx8qm: tlb SW workaround for IMX8QM



> -----Original Message-----
> From: Oliver Graute <oliver.graute@...il.com>
> Sent: Monday, August 10, 2020 2:13 PM
> To: Jason Liu <jason.hui.liu@....com>
> Cc: Anson Huang <anson.huang@....com>; Aisheng Dong
> <aisheng.dong@....com>; catalin.marinas@....com; will@...nel.org;
> dl-linux-imx <linux-imx@....com>; linux-kernel@...r.kernel.org
> Subject: Re: arm64: imx8qm: tlb SW workaround for IMX8QM
> 
> On 27/04/20, Oliver Graute wrote:
> > On 27/04/20, Oliver Graute wrote:
> > > Hello,
> > >
> > > is this nxp software workaround already proposed to linux community?
> > > can someone point me to the discussion if available.
> > >
> > > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fso
> > >
> urce.codeaurora.org%2Fexternal%2Fimx%2Flinux-imx%2Fcommit%2F%3Fh%3
> D3
> > >
> Dimx_5.4.3_%3D&amp;data=02%7C01%7Cjason.hui.liu%40nxp.com%7Cef51bf
> 7d
> > >
> 704f4b7439f808d83cf48290%7C686ea1d3bc2b4c6fa92cd99c5c301635%7C0%
> 7C0%
> > >
> 7C637326368154132369&amp;sdata=GrMP8XdoYETWiFdHTHStYv7CEZjRx%2F
> mkygA
> > > prGckrus%3D&amp;reserved=0
> > > 2.0.0&id=3D593bea4e36d8c8a4fd65ef4f07fb8144dab2de1c
> >
> > sry for the broken link. Here the right one:
> >
> > https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsour
> >
> ce.codeaurora.org%2Fexternal%2Fimx%2Flinux-imx%2Fcommit%2F%3Fh%3Di
> mx_5
> > .4.3_2.0.0%26id%3D593bea4e36d8c8a4fd65ef4f07fb8144dab2de1c&amp;da
> ta=02
> > %7C01%7Cjason.hui.liu%40nxp.com%7Cef51bf7d704f4b7439f808d83cf4829
> 0%7C6
> >
> 86ea1d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C637326368154142361&a
> mp;sdata
> >
> =US2Pu6eOo3vLLNBH7Y1zZM5LACrnhLWGmx7bOc5fNg4%3D&amp;reserved=
> 0
> 
> this patch is not applicable anymore since next-20200713. Is there an updated
> one?

The patch has been updated a little bit according to latest ERRATA. The patch not
sent upstream yet.

> 
> Best Regards,
> 
> Oliver

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ