lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 8 Jul 2022 11:23:23 +0800
From:   Jianmin Lv <lvjianmin@...ngson.cn>
To:     Marc Zyngier <maz@...nel.org>
Cc:     Thomas Gleixner <tglx@...utronix.de>, linux-kernel@...r.kernel.org,
        Hanjun Guo <guohanjun@...wei.com>,
        Lorenzo Pieralisi <lorenzo.pieralisi@....com>,
        Jiaxun Yang <jiaxun.yang@...goat.com>,
        Huacai Chen <chenhuacai@...ngson.cn>
Subject: Re: [PATCH V14 03/15] ACPI: irq: Allow acpi_gsi_to_irq() to have an
 arch-specific fallback



On 2022/7/7 下午6:14, Marc Zyngier wrote:
> On Sun, 03 Jul 2022 09:45:20 +0100,
> Jianmin Lv <lvjianmin@...ngson.cn> wrote:
>>
>> From: Marc Zyngier <maz@...nel.org>
>>
>> It appears that the generic version of acpi_gsi_to_irq() doesn't
>> fallback to establishing a mapping if there is no pre-existing
>> one while the x86 version does.
>>
>> While arm64 seems unaffected by it, LoongArch is relying on the x86
>> behaviour. In an effort to prevent new architectures from reinventing
>> the proverbial wheel, provide an optional callback that the arch code
>> can set to restore the x86 behaviour.
>>
>> Hopefully we can eventually get rid of this in the future once
>> the expected behaviour has been clarified.
>>
>> Reported-by: Jianmin Lv <lvjianmin@...ngson.cn>
>> Signed-off-by: Marc Zyngier <maz@...nel.org>
>> Signed-off-by: Jianmin Lv <lvjianmin@...ngson.cn>
> 
> Same thing about this patch. It is your duty to collect the tags when
> you repost a series.
>

Ok, thanks, I'll add tags from Hanjun.


> Thanks,
> 
> 	M.
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ