lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4ae60e8c-6a86-4895-b8fe-48de5b64b6c8@suse.de>
Date: Thu, 18 Jan 2024 09:41:34 +0100
From: Thomas Zimmermann <tzimmermann@...e.de>
To: Jiri Slaby <jirislaby@...nel.org>, gregkh@...uxfoundation.org
Cc: linux-fbdev@...r.kernel.org, linux-parisc@...r.kernel.org,
 Helge Deller <deller@....de>, linux-kernel@...r.kernel.org,
 dri-devel@...ts.freedesktop.org,
 "James E.J. Bottomley" <James.Bottomley@...senPartnership.com>,
 linux-serial@...r.kernel.org
Subject: Re: [PATCH 31/45] tty: vt: use VESA blanking constants

Hi

Am 18.01.24 um 09:32 schrieb Jiri Slaby:
> On 18. 01. 24, 9:30, Thomas Zimmermann wrote:
>> Am 18.01.24 um 08:57 schrieb Jiri Slaby (SUSE):
>>> There are VESA blanking constants defined in console.h already. So use
>>> them in the console code instead of constant values.
>>
>> These constants also exist in include/uapi/linux/fb.h. It would be 
>> nice to find a common header where they can be shared.
> 
> Hi,
> 
> see 32/45.
> 
> I actually don't know how to fix that nicely while keeping uapi happy.

Is it hard to get a new UAPI header accepted (honest question)? There 
are a few things I'd like to split off from fbdev. But that would 
require UAPI headers.

Best regards
Thomas

> 

-- 
Thomas Zimmermann
Graphics Driver Developer
SUSE Software Solutions Germany GmbH
Frankenstrasse 146, 90461 Nuernberg, Germany
GF: Ivo Totev, Andrew Myers, Andrew McDonald, Boudien Moerman
HRB 36809 (AG Nuernberg)

Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (841 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ