lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 20 Apr 2022 05:50:11 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Pu Lehui <pulehui@...wei.com> Cc: bpf@...r.kernel.org, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, linux-riscv@...ts.infradead.org, andrii@...nel.org, ast@...nel.org, daniel@...earbox.net, kafai@...com, songliubraving@...com, yhs@...com, john.fastabend@...il.com, kpsingh@...nel.org, paul.walmsley@...ive.com, palmer@...belt.com, aou@...s.berkeley.edu Subject: Re: [PATCH v2 bpf-next 0/2] Support riscv libbpf USDT arg parsing logic Hello: This series was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@...nel.org>: On Tue, 19 Apr 2022 22:52:36 +0800 you wrote: > patch 1 fix a minor issue where usdt_cookie is cast to 32 bits. > patch 2 add support riscv libbpf USDT argument parsing logic, > both RV32 and RV64 tests have been passed as like follow: > > # ./test_progs -t usdt > #169 usdt:OK > Summary: 1/4 PASSED, 0 SKIPPED, 0 FAILED > > [...] Here is the summary with links: - [v2,bpf-next,1/2] libbpf: Fix usdt_cookie being cast to 32 bits https://git.kernel.org/bpf/bpf-next/c/5af25a410acb - [v2,bpf-next,2/2] libbpf: Support riscv USDT argument parsing logic https://git.kernel.org/bpf/bpf-next/c/58ca8b0572cd You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists