lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <ZW2NCm/pIthdpNgF@gauss3.secunet.de> Date: Mon, 4 Dec 2023 09:25:46 +0100 From: Steffen Klassert <steffen.klassert@...unet.com> To: Daniel Xu <dxu@...uu.xyz> CC: Alexei Starovoitov <alexei.starovoitov@...il.com>, Network Development <netdev@...r.kernel.org>, LKML <linux-kernel@...r.kernel.org>, bpf <bpf@...r.kernel.org>, clang-built-linux <llvm@...ts.linux.dev>, "open list:KERNEL SELFTEST FRAMEWORK" <linux-kselftest@...r.kernel.org>, <antony.antony@...unet.com>, Yonghong Song <yonghong.song@...ux.dev>, Eddy Z <eddyz87@...il.com>, <devel@...ux-ipsec.org>, Eyal Birger <eyal.birger@...il.com> Subject: Re: [PATCH ipsec-next v3 0/9] Add bpf_xdp_get_xfrm_state() kfunc On Fri, Dec 01, 2023 at 05:16:04PM -0700, Daniel Xu wrote: > On Fri, Dec 01, 2023 at 04:10:18PM -0800, Alexei Starovoitov wrote: > > On Fri, Dec 1, 2023 at 12:23 PM Daniel Xu <dxu@...uu.xyz> wrote: > > > > > > include/net/xfrm.h | 9 + > > > net/xfrm/Makefile | 1 + > > > net/xfrm/xfrm_policy.c | 2 + > > > net/xfrm/xfrm_state_bpf.c | 128 ++++++++++++++ > > > tools/lib/bpf/bpf_core_read.h | 34 ++++ > > > .../selftests/bpf/prog_tests/test_tunnel.c | 162 +++++++++++++++++- > > > .../selftests/bpf/prog_tests/verifier.c | 2 + > > > tools/testing/selftests/bpf/progs/bpf_misc.h | 1 + > > > .../selftests/bpf/progs/bpf_tracing_net.h | 1 + > > > .../selftests/bpf/progs/test_tunnel_kern.c | 138 ++++++++------- > > > .../bpf/progs/verifier_bitfield_write.c | 100 +++++++++++ > > > tools/testing/selftests/bpf/test_loader.c | 7 + > > > tools/testing/selftests/bpf/test_tunnel.sh | 92 ---------- > > > 13 files changed, 522 insertions(+), 155 deletions(-) > > > > I really think this should go via bpf-next tree. > > The bpf changes are much bigger than ipsec. > > Ack. Ended up picking up a lot of stuff along the way. I'm fine with merging this via the bpf-next tree. Please consider to merge the bpf hepler functions to one file. We have already xfrm_interface_bpf.c and now you introduce xfrm_state_bpf.c. Try to merge this into a single xfrm_bpf.c file.
Powered by blists - more mailing lists