lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 22 May 2019 10:41:29 -0700 From: Jakub Kicinski <jakub.kicinski@...ronome.com> To: Björn Töpel <bjorn.topel@...il.com> Cc: toke@...hat.com, ast@...nel.org, daniel@...earbox.net, netdev@...r.kernel.org, magnus.karlsson@...el.com, bjorn.topel@...el.com, brouer@...hat.com, bpf@...r.kernel.org Subject: Re: [PATCH bpf-next 0/2] net: xdp: refactor the XDP_QUERY_PROG and XDP_QUERY_PROG_HW code On Wed, 22 May 2019 14:53:50 +0200, Björn Töpel wrote: > Shout out to all XDP driver hackers to check that the second patch > doesn't break anything (especially Jakub). I've only been able to test > on the Intel NICs. Please test XDP offload on netdevsim, that's why we have it! :) At the minimum please run tools/testing/selftests/bpf/test_offload.py Now let me look at the code :)
Powered by blists - more mailing lists