lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20200330085528.18e3ca7e@carbon>
Date:   Mon, 30 Mar 2020 08:55:28 +0200
From:   Jesper Dangaard Brouer <brouer@...hat.com>
To:     Eric Sage <eric@...e.org>
Cc:     brouer@...hat.com, bpf@...r.kernel.org, ast@...nel.org,
        daniel@...earbox.net, kafai@...com, yhs@...com, andriin@...com,
        john.fastabend@...il.com, davem@...emloft.net,
        netdev@...r.kernel.org
Subject: Re: [PATCH v4] samples/bpf: Add xdp_stat sample program

On Sun, 29 Mar 2020 16:16:30 -0700
Eric Sage <eric@...e.org> wrote:

[...]
> ---
>  samples/bpf/Makefile          |   3 +
>  samples/bpf/xdp_stat          | Bin 0 -> 200488 bytes

No binary files please.

>  samples/bpf/xdp_stat_common.h |  28 ++
>  samples/bpf/xdp_stat_kern.c   | 192 +++++++++
>  samples/bpf/xdp_stat_user.c   | 748 ++++++++++++++++++++++++++++++++++
>  5 files changed, 971 insertions(+)
>  create mode 100755 samples/bpf/xdp_stat
>  create mode 100644 samples/bpf/xdp_stat_common.h
>  create mode 100644 samples/bpf/xdp_stat_kern.c
>  create mode 100644 samples/bpf/xdp_stat_user.c
> 
[...]
> diff --git a/samples/bpf/xdp_stat b/samples/bpf/xdp_stat
> new file mode 100755
> index 0000000000000000000000000000000000000000..32a05e4e3f804400914d5048bfb602888af00b11
> GIT binary patch
> literal 200488
> zcmeFadw3K@...3J3=jqBsGw0%qmFA((L_ZP0nL~h=+TKr0YMQ7h6IpXmdrrB5}XOp
> zHiPlHuInmZ*2O!!A~!Laa7hqvfHxE`5ie9T3aCgxg?ztXb<d<>o%i|v`2P8x=M4|(
> zu2ZL~PMtb+>YP(momu|i;0%{bN&aLgmnlru<rhnk^;=OUbjy@...h`qmG1a`s&b0b  
> z6=}DGF^74@...`_$fS~dW?4yvwXxhHJAY9|F;Ywy^P%*SzdN5v3i)KY&YxoY)p{1%
> z1(Q!D+sbCSE_}`9FZ|>d%SZC*f5d7b`E-_(?ZvHpCGNG#+0VtRtYq@(EJxl{*ION|  
> ze)tNBn0ywhR=G#*XR;izS#EdCD!2QeR=L#ECS$k#O!AX7^8Z?^7@...F<s1u;*-BS
> zpTy-)*>|CFd@t)~6)fv#wU>MbyGt}B`An9(7Uf9i|JxsX7?kVm_R{gC;Yh2-<kRk^
> za{lCrw_JSD`IE=>n>=x9xVB$y;l=$fzUaJ~Y3E%a``ru0C{shO9<H46_opwvV6!Ld  
> z#dVX5&-MIzPFB@...J3T!1{>8AL85WlFv${nJ@...~gpgSQY-i_H_F(ML!!!u>|DM
> zpHd``ITR#QZ>NFJL*svj&vE@...h{`Z=wT#hJR6-cK@...6k-U{b}H2#Gkc$R2uwa  
> z)6n@...FasQ_t8m@...Jk*3|XY1;i)8vHxbj8~sD_+8TAf0u^N9%<@1FAe;qH1*t@

No binary files please.

-- 
Best regards,
  Jesper Dangaard Brouer
  MSc.CS, Principal Kernel Engineer at Red Hat
  LinkedIn: http://www.linkedin.com/in/brouer

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ