lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAhSdy1HnzB5T0G3dEfuVX1LHCMy6H4B1paQyCKC-iXTJ_Nf=w@mail.gmail.com>
Date: Fri, 22 Mar 2024 17:20:00 +0530
From: Anup Patel <anup@...infault.org>
To: Bing Fan <hptsfb@...il.com>
Cc: Anup Patel <apatel@...tanamicro.com>, Paolo Bonzini <pbonzini@...hat.com>, 
	Atish Patra <atishp@...shpatra.org>, Palmer Dabbelt <palmer@...belt.com>, 
	Paul Walmsley <paul.walmsley@...ive.com>, Andrew Jones <ajones@...tanamicro.com>, kvm@...r.kernel.org, 
	kvm-riscv@...ts.infradead.org, linux-riscv@...ts.infradead.org, 
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/2] KVM RISC-V APLIC fixes

On Fri, Mar 22, 2024 at 5:05 PM Bing Fan <hptsfb@...il.com> wrote:
>
>
> Hi,
>
>
> As you mentioned as below, riscv's aia patch in
> https://github.com/avpatel/linux.git
>
> Why is this series of patches not merged into upstream?

This will be sent as part of Linux-6.9-rcX fixes (after 1-2 weeks).

Regards,
Anup

>
>
> 在 2024/3/21 16:50, Anup Patel 写道:
> > Few fixes for KVM RISC-V in-kernel APLIC emulation which were discovered
> > during Linux AIA driver patch reviews.
> >
> > These patches can also be found in the riscv_kvm_aplic_fixes_v1
> > branch at: https://github.com/avpatel/linux.git
> >
> > Anup Patel (2):
> >    RISC-V: KVM: Fix APLIC setipnum_le/be write emulation
> >    RISC-V: KVM: Fix APLIC in_clrip[x] read emulation
> >
> >   arch/riscv/kvm/aia_aplic.c | 37 +++++++++++++++++++++++++++++++------
> >   1 file changed, 31 insertions(+), 6 deletions(-)
> >

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ