lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20230525-scoff-eldest-57ec643005dc@wendy>
Date:   Thu, 25 May 2023 13:50:19 +0100
From:   Conor Dooley <conor.dooley@...rochip.com>
To:     Palmer Dabbelt <palmer@...belt.com>
CC:     Conor Dooley <conor@...nel.org>, <rdunlap@...radead.org>,
        Arnd Bergmann <arnd@...db.de>, <alex@...ti.fr>,
        Stephen Rothwell <sfr@...b.auug.org.au>,
        <linux-next@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
        Paul Walmsley <paul.walmsley@...ive.com>,
        <aou@...s.berkeley.edu>, <linux-riscv@...ts.infradead.org>,
        <vitaly.wool@...sulko.com>
Subject: Re: linux-next: Tree for May 15 (several RV64 build errors)

On Wed, May 24, 2023 at 04:11:05PM -0700, Palmer Dabbelt wrote:
> On Wed, 24 May 2023 15:49:41 PDT (-0700), Conor Dooley wrote:
> > On Wed, May 24, 2023 at 03:41:15PM -0700, Randy Dunlap wrote:

> > > XIP_KERNEL already has "depends on !COMPILE_TEST", since April of 2021.
> > 
> > Half of me wants to say just remove XIP_KERNEL entirely. Or make it
> > depend on BROKEN, since noone seems to actually test it and I don't
> > think we even know if it works right now?
> 
> Ya, let's do it.  If it's broken and nobody has said anything but
> randconfig, then probably nobody's using it.  Let's mark it as broken or
> deprecated or whatever and then see if anyone complains.

Apart from being able to generate kernels that are broken (IOW this
randconfig), when we changed the dtb back to being in the fix, we
removed some special case XIP_KERNEL stuff (that's commit f1581626071c
("riscv: Do not set initial_boot_params to the linear address of the
dtb")) where Alex didn't know for sure whether it was safe to do.


Vexriscv (which is Myrtle I think) & Vitaly Wool both have an interest
in it. I dunno Myrtle's email, but I've CCed Vitaly. Maybe someone can
at least test the thing :)

Cheers,
Conor.

Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ