lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAHgaXdKqt3mZmPG78w+4g_17D8EQoBgAZeuqM+MMsQg2f7apsw@mail.gmail.com> Date: Tue, 23 May 2017 10:33:26 +0530 From: Shubham Bansal <illusionist.neo@...il.com> To: Kees Cook <keescook@...omium.org> Cc: Florian Fainelli <f.fainelli@...il.com>, Daniel Borkmann <daniel@...earbox.net>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, Network Development <netdev@...r.kernel.org>, ast@...com, Mircea Gherzan <mgherzan@...il.com>, David Miller <davem@...emloft.net>, "linux-arm-kernel@...ts.infradead.org" <linux-arm-kernel@...ts.infradead.org>, Nicolas Schichan <nschichan@...ebox.fr>, andrew@...n.ch Subject: Re: arch: arm: bpf: Converting cBPF to eBPF for arm 32 bit Hi Kees, I already have ARMv5 and ARMv6 code written. I just haven't tested it yet. Should i send the patch with those as well ? Best, Shubham Bansal On Tue, May 23, 2017 at 9:52 AM, Kees Cook <keescook@...omium.org> wrote: > On Mon, May 22, 2017 at 8:34 PM, Shubham Bansal > <illusionist.neo@...il.com> wrote: >> I would post them as soon as I test them on ARMv5 and ARMv6. If you >> can help me with that, please let me know. > > Please post what you have: it would be better to see what you've got > now in case additional changes are needed so you don't have to do it > again on v5 and v6. Also, it means other people with real v5 and v6 > hardware could test for you if they were so inclined, and you won't > need to be blocked on doing the tests in qemu. > > You can send it as an "RFC" in the subject, just to make sure people > know it's not considered fully done. :) > > -Kees > > -- > Kees Cook > Pixel Security
Powered by blists - more mailing lists