lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <BM1PR01MB03227CDF5BFE09081B4993C5FC920@BM1PR01MB0322.INDPRD01.PROD.OUTLOOK.COM>
Date:   Fri, 1 Sep 2017 12:24:08 +0000
From:   Kaushik Phatak <Kaushik.Phatak@...t.com>
To:     "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
CC:     Yury Norov <ynorov@...iumnetworks.com>
Subject: RE: [PATCH] Unifying headers for AArch64 and ARM

Ping for this patch:
https://lkml.org/lkml/2017/8/10/136

The patch can be viewed on the mail-archive link below,
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1465874.html

Please let me know if anyone has any feedback on this.
Thanks.

Best Regards,
Kaushik M. Phatak

-----Original Message-----
From: Kaushik Phatak
Sent: Thursday, August 10, 2017 2:12 PM
To: 'linux-kernel@...r.kernel.org' <linux-kernel@...r.kernel.org>
Subject: [PATCH] Unifying headers for AArch64 and ARM

Hi,
This patch is an attempt to unify the kernel header files for AArch64 and ARM. We have developed similar patch for glibc, which unifies the headers in sysdeps. We plan to post that separately to libc-alpha.

This developed patch is similar to something that X86 does with the macros (__x86_64__) and (__ILP32__).

We have noticed some activity in this area in recent times, Linux patches by Yury Norov:
[07/20] arm64:uapi: set __BITS_PER_LONG correctly for ILP32 and LP64 https://patchwork.kernel.org/patch/9599053/

This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ