lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4d0ea144.51f5.190b4e9c0f6.Coremail.gaoshanliukou@163.com>
Date: Mon, 15 Jul 2024 13:42:16 +0800 (CST)
From: "yang.zhang" <gaoshanliukou@....com>
To: patchwork-bot+linux-riscv@...nel.org
Cc: linux-riscv@...ts.infradead.org, alexghiti@...osinc.com, 
	paul.walmsley@...ive.com, palmer@...belt.com, aou@...s.berkeley.edu, 
	linux-kernel@...r.kernel.org, yang.zhang@...intek.com
Subject: Re:Re: [PATCH V3] riscv: set trap vector earlier



hi:
Yeah, thanks.













At 2024-07-15 04:30:33, patchwork-bot+linux-riscv@...nel.org wrote:
>Hello:
>
>This patch was applied to riscv/linux.git (for-next)
>by Palmer Dabbelt <palmer@...osinc.com>:
>
>On Wed,  8 May 2024 10:24:45 +0800 you wrote:
>> From: "yang.zhang" <yang.zhang@...intek.com>
>> 
>> The exception vector of the booting hart is not set before enabling
>> the mmu and then still points to the value of the previous firmware,
>> typically _start. That makes it hard to debug setup_vm() when bad
>> things happen. So fix that by setting the exception vector earlier.
>> 
>> [...]
>
>Here is the summary with links:
>  - [V3] riscv: set trap vector earlier
>    https://git.kernel.org/riscv/c/6ad8735994b8
>
>You are awesome, thank you!
>-- 
>Deet-doot-dot, I am a bot.
>https://korg.docs.kernel.org/patchwork/pwbot.html
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ