lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 11 Dec 2017 10:32:30 +0000
From:   Catalin Marinas <>
To:     Yury Norov <>
Cc:     Arnd Bergmann <>,,,,,
        Heiko Carstens <>,
        Chris Metcalf <>,,
        Joseph Myers <>,,
        Steve Ellcey <>,, Andreas Schwab <>,
        Alexander Graf <>,
        Geert Uytterhoeven <>,
        Adam Borowski <>,, James Hogan <>,
        Chris Metcalf <>,
        Andrew Pinski <>,,
        Alexey Klimov <>,
        Mark Brown <>,
        Bamvor Zhangjian <>,
        Maxim Kuvyrkov <>,
        Florian Weimer <>,,
        James Morse <>,
        Ramana Radhakrishnan <>,,,
Subject: Re: [PATCH v8 00/20] ILP32 for ARM64

Hi Yury,

On Thu, Nov 16, 2017 at 02:11:30PM +0300, Yury Norov wrote:
> This is ILP32 patches on top of 4.14 kernel:
> I tested the series with LTP lite built by Linaro toolchain, and no
> regressions found.

Thanks. I gave it a try as well with LTP and pushed a staging/ilp32-4.14
branch to the arm64 tree on BTW, you've added two random
patches on top of this branch (which I removed).

> By the way, do you have plans to upstream arch subseries? 

I was hoping Arnd would pick them up since they are rather UAPI specific
than arm64.

BTW, I wonder whether the nds32 patches actually follow the proposed
defaults in your patches like force_o_largefile() and get/setrlimit:

(I haven't reviewed the nds32 patches in detail though)


Powered by blists - more mailing lists