lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAGXu5j+2q4Wwfhuk_DnDaV894A9ZOD=A_AvAU_OZG6KQv0_KMg@mail.gmail.com> Date: Thu, 11 May 2017 08:30:28 -0700 From: Kees Cook <keescook@...omium.org> To: Shubham Bansal <illusionist.neo@...il.com> Cc: David Miller <davem@...emloft.net>, Mircea Gherzan <mgherzan@...il.com>, Network Development <netdev@...r.kernel.org>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, "linux-arm-kernel@...ts.infradead.org" <linux-arm-kernel@...ts.infradead.org>, ast@...com, Daniel Borkmann <daniel@...earbox.net> Subject: Re: arch: arm: bpf: Converting cBPF to eBPF for arm 32 bit On Thu, May 11, 2017 at 2:32 AM, Shubham Bansal <illusionist.neo@...il.com> wrote: > What do you guys suggest i should implement it? I am almost done with > my current implementation but if you think I should change it to the > way David suggested, its better to suggest now before I send the > patch. I'd say send what you have right now, as it's a good starting point for future work. I'll be curious to see the benchmarks, etc. It can be a base for further optimization. Thanks for chipping away at this! -Kees -- Kees Cook Pixel Security
Powered by blists - more mailing lists