lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 2 Aug 2022 09:15:39 +0200
From:   Birger Koblitz <git@...ger-koblitz.de>
To:     Sander Vanheule <sander@...nheule.net>,
        Thomas Bogendoerfer <tsbogend@...ha.franken.de>,
        Martin Blumenstingl <martin.blumenstingl@...glemail.com>
Cc:     Marc Zyngier <maz@...nel.org>,
        Aleksander Jan Bajkowski <olek2@...pl>,
        Hauke Mehrtens <hauke@...ke-m.de>, linux-mips@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH] MIPS: smp-mt: enable all hardware interrupts on second
 VPE

Hi,

On 8/1/22 18:02, Sander Vanheule wrote:
> Hi Thomas,
> 
> On Mon, 2022-08-01 at 17:25 +0200, Thomas Bogendoerfer wrote:
>> On Thu, Jul 28, 2022 at 05:50:10PM +0200, Martin Blumenstingl wrote:
>>> I think for the Realtek SoC's this would be problematic because it's
>>> using MIPS_GENERIC. My understanding is that in an ideal world all
>>
>> which SOC are these ?
> 
> That would be the SoCs supported by MACH_REALTEK_RTL. More specifically, the
> ones affected by this issue are the RTL8391M, RTL8392M, RTL8393M, and RTL8396M
> which have two VPEs.

There is also a multitude of RTL930x SoCs, which have the same setup as the
RTL839x SoCs regarding the VPEs and the same IRQ controller.
But they also have a broken MIPS Timer IRQ and we are not able at the moment
to get the second VPE up without running into immediate trouble.
For the moment we only need to take care of the RTL839x, though.

Cheers,
   Birger

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ