lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <176f6ecc-dcd3-e646-f812-a2cb2a2b446b@iogearbox.net>
Date:   Tue, 13 Aug 2019 23:22:40 +0200
From:   Daniel Borkmann <daniel@...earbox.net>
To:     Andrii Nakryiko <andriin@...com>, bpf@...r.kernel.org,
        netdev@...r.kernel.org, ast@...com, acme@...hat.com
Cc:     andrii.nakryiko@...il.com, kernel-team@...com
Subject: Re: [PATCH bpf-next 0/2] libbpf: make use of BTF through sysfs

On 8/13/19 8:54 PM, Andrii Nakryiko wrote:
> Now that kernel's BTF is exposed through sysfs at well-known location, attempt
> to load it first as a target BTF for the purpose of BPF CO-RE relocations.
> 
> Patch #1 is a follow-up patch to rename /sys/kernel/btf/kernel into
> /sys/kernel/btf/vmlinux.
> Patch #2 adds ability to load raw BTF contents from sysfs and expands the list
> of locations libbpf attempts to load vmlinux BTF from.
> 
> Andrii Nakryiko (2):
>    btf: rename /sys/kernel/btf/kernel into /sys/kernel/btf/vmlinux
>    libbpf: attempt to load kernel BTF from sysfs first
> 
>   Documentation/ABI/testing/sysfs-kernel-btf |  2 +-
>   kernel/bpf/sysfs_btf.c                     | 30 +++++-----
>   scripts/link-vmlinux.sh                    | 18 +++---
>   tools/lib/bpf/libbpf.c                     | 64 +++++++++++++++++++---
>   4 files changed, 82 insertions(+), 32 deletions(-)
> 

LGTM, applied thanks!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ