lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAMe9rOom59dS1X6tfUec36O3Q0jFDZiE36Pesw3+Nvr7kyTUqg@mail.gmail.com>
Date:	Thu, 24 Nov 2011 15:58:19 -0800
From:	"H.J. Lu" <hjl.tools@...il.com>
To:	GCC Development <gcc@....gnu.org>,
	GNU C Library <libc-alpha@...rceware.org>,
	LKML <linux-kernel@...r.kernel.org>, x32-abi@...glegroups.com
Subject: X32 project status update

Hi,

This is the x32 project status update:

https://sites.google.com/site/x32abi/

There are several changes:

1. We changed x32 kernel to use the 64bit filesystem interface (LFS) as well as
64bit time_t.  We are targeting Linux kernel 3.3.
2. I backported x32 support to glibc 2.14, 2.13, 2.12 and 2.11.  Since
glibc 2.11
is the first x32 release now, the x32 minimum ABI is changed from GLIBC_2.14
to GLIBC_2.11, which require recompiling all existing x32 binaries.
3. I am implementing address-size override:

http://gcc.gnu.org/bugzilla/show_bug.cgi?id=50797

The result shows that it can improve SPEC CPU performance by another 5%
over the current x32 implementation.  I am putting this on hjl/x32/addr32 branch
at

http://gcc.gnu.org/git/?p=gcc.git;a=summary

I also backported it to GCC 4.6 on hjl/x32/gcc-4_6-branch branch.


-- 
H.J.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ