lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAJ+HfNhkntaYv7EaZc4Besm5Gj7epdN-mXFj2UaN=Pu-7pu+zw@mail.gmail.com> Date: Wed, 22 May 2019 22:48:09 +0200 From: Björn Töpel <bjorn.topel@...il.com> To: Jakub Kicinski <jakub.kicinski@...ronome.com> Cc: Toke Høiland-Jørgensen <toke@...hat.com>, Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, Netdev <netdev@...r.kernel.org>, "Karlsson, Magnus" <magnus.karlsson@...el.com>, Björn Töpel <bjorn.topel@...el.com>, Jesper Dangaard Brouer <brouer@...hat.com>, bpf <bpf@...r.kernel.org> Subject: Re: [PATCH bpf-next 0/2] net: xdp: refactor the XDP_QUERY_PROG and XDP_QUERY_PROG_HW code On Wed, 22 May 2019 at 19:41, Jakub Kicinski <jakub.kicinski@...ronome.com> wrote: > > On Wed, 22 May 2019 14:53:50 +0200, Björn Töpel wrote: > > Shout out to all XDP driver hackers to check that the second patch > > doesn't break anything (especially Jakub). I've only been able to test > > on the Intel NICs. > > Please test XDP offload on netdevsim, that's why we have it! :) > At the minimum please run tools/testing/selftests/bpf/test_offload.py > Yikes, I did not know about this. Thanks for pointing it out! I'll do that from now on! Thanks, Björn > Now let me look at the code :) Thanks! :-)
Powered by blists - more mailing lists