lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: 
 <176613179753.3684357.9232536876700383473.git-patchwork-notify@kernel.org>
Date: Fri, 19 Dec 2025 08:09:57 +0000
From: patchwork-bot+linux-riscv@...nel.org
To: Chunyan Zhang <zhangchunyan@...as.ac.cn>
Cc: linux-riscv@...ts.infradead.org, akpm@...ux-foundation.org,
 paul.walmsley@...ive.com, palmer@...belt.com, robh@...nel.org,
 krzk+dt@...nel.org, viro@...iv.linux.org.uk, linux-mm@...ck.org,
 peterx@...hat.com, arnd@...db.de, david@...hat.com,
 lorenzo.stoakes@...cle.com, Liam.Howlett@...cle.com, vbabka@...e.cz,
 rppt@...nel.org, surenb@...gle.com, mhocko@...e.com,
 axelrasmussen@...gle.com, yuanchu@...gle.com, aou@...s.berkeley.edu,
 alex@...ti.fr, devicetree@...r.kernel.org, conor@...nel.org,
 debug@...osinc.com, ved@...osinc.com, linux-fsdevel@...r.kernel.org,
 brauner@...nel.org, jack@...e.cz, linux-kernel@...r.kernel.org,
 zhang.lyra@...il.com
Subject: Re: [PATCH V15 0/6] mm: Add soft-dirty and uffd-wp support for RISC-V

Hello:

This series was applied to riscv/linux.git (fixes)
by Andrew Morton <akpm@...ux-foundation.org>:

On Thu, 13 Nov 2025 15:28:00 +0800 you wrote:
> This patchset adds support for Svrsw60t59b [1] extension which is ratified now,
> also add soft dirty and userfaultfd write protect tracking for RISC-V.
> 
> The patches 1 and 2 add macros to allow architectures to define their own checks
> if the soft-dirty / uffd_wp PTE bits are available, in other words for RISC-V,
> the Svrsw60t59b extension is supported on which device the kernel is running.
> Also patch1-2 are removing "ifdef CONFIG_MEM_SOFT_DIRTY"
> "ifdef CONFIG_HAVE_ARCH_USERFAULTFD_WP" and
> "ifdef CONFIG_PTE_MARKER_UFFD_WP" in favor of checks which if not overridden by
> the architecture, no change in behavior is expected.
> 
> [...]

Here is the summary with links:
  - [V15,1/6] mm: softdirty: Add pgtable_supports_soft_dirty()
    (no matching commit)
  - [V15,2/6] mm: userfaultfd: Add pgtable_supports_uffd_wp()
    https://git.kernel.org/riscv/c/f59c0924d61a
  - [V15,3/6] riscv: Add RISC-V Svrsw60t59b extension support
    https://git.kernel.org/riscv/c/59f6acb4be02
  - [V15,4/6] riscv: mm: Add soft-dirty page tracking support
    https://git.kernel.org/riscv/c/2a3ebad4db63
  - [V15,5/6] riscv: mm: Add userfaultfd write-protect support
    https://git.kernel.org/riscv/c/c64da3950cf4
  - [V15,6/6] dt-bindings: riscv: Add Svrsw60t59b extension description
    https://git.kernel.org/riscv/c/519912bdaee8

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ