lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250201020003.GA77370@sol.localdomain>
Date: Fri, 31 Jan 2025 18:00:03 -0800
From: Eric Biggers <ebiggers@...nel.org>
To: Palmer Dabbelt <palmer@...osinc.com>
Cc: Linus Torvalds <torvalds@...ux-foundation.org>,
	linux-riscv@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: Re: [GIT PULL] RISC-V Patches for the 6.14 Merge Window, Part 1

On Fri, Jan 31, 2025 at 12:08:40PM -0800, Palmer Dabbelt wrote:
> The following changes since commit fac04efc5c793dccbd07e2d59af9f90b7fc0dca4:
> 
>   Linux 6.13-rc2 (2024-12-08 14:03:39 -0800)
> 
> are available in the Git repository at:
> 
>   git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git tags/riscv-for-linus-6.14-mw1
> 
> for you to fetch changes up to 101971298be2aa4706c8602bd81066a0f6f2ced5:
> 
>   riscv: add a warning when physical memory address overflows (2025-01-29 18:36:09 -0800)
> 
> ----------------------------------------------------------------
> RISC-V Patches for the 6.14 Merge Window, Part 1
> 
> * The PH1520 pinctrl and dwmac drivers are enabeled in defconfig.
> * A redundant AQRL barrier has been removed from the futex cmpxchg
>   implementation.
> * Support for the T-Head vector extensions, which includes exposing
>   these extensions to userspace on systems that implement them.
> * Some more page table information is now printed on die() and systems
>   that cause PA overflows.

FYI this pull request added a 90KB ELF binary at
scripts/selinux/genheaders/genheaders in the following commit:

    commit 101971298be2aa4706c8602bd81066a0f6f2ced5 (riscv/for-next)
    Author: Yunhui Cui <cuiyunhui@...edance.com>
    Date:   Wed Aug 14 14:26:25 2024 +0800

        riscv: add a warning when physical memory address overflows

Presumably a mistake, or else something a lot more interesting.

- Eric

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ