lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <tencent_AA234615114B0D808474B2D42F9955A25F09@qq.com>
Date:   Mon, 21 Aug 2023 14:49:58 +0800
From:   Rong Tao <rtoax@...mail.com>
To:     yonghong.song@...ux.dev
Cc:     andrii@...nel.org, ast@...nel.org, bpf@...r.kernel.org,
        daniel@...earbox.net, haoluo@...gle.com, john.fastabend@...il.com,
        kpsingh@...nel.org, linux-kernel@...r.kernel.org,
        linux-kselftest@...r.kernel.org, martin.lau@...ux.dev,
        mykolal@...com, olsajiri@...il.com, rongtao@...tc.cn,
        rtoax@...mail.com, sdf@...gle.com, shuah@...nel.org,
        song@...nel.org
Subject: Re: [PATCH bpf-next v5] selftests/bpf: trace_helpers.c: optimize kallsyms cache

tools/testing/selftests/bpf/ compile OK, however, samples/bpf/ compile failed.

>> 	tools/testing/selftests/bpf/trace_helpers.c:17:10:
>> 	fatal error: libbpf_internal.h: No such file or directory
>> 	   17 | #include "libbpf_internal.h"
>> 	      |          ^~~~~~~~~~~~~~~~~~~
>>
>> 	tools/testing/selftests/bpf/trace_helpers.c:17:10:
>> 	fatal error: bpf/libbpf_internal.h: No such file or directory
>> 	   17 | #include "bpf/libbpf_internal.h"
>> 	      |           ^~~~~~~~~~~~~~~~~~~~~~~

I just submit v6 [0], which apply libbpf_ensure_mem() and

	TPROGS_CFLAGS += -I$(srctree)/tools/lib

to samples/bpf/Makefile, make sure, samples/bpf/Makefile could found
libbpf_internal.h.

Please review, thanks.

Rong Tao

[0] https://lore.kernel.org/lkml/tencent_4A09A36F883A06EA428A593497642AF8AF08@qq.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ