lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 4 May 2020 13:43:17 +0200 From: Björn Töpel <bjorn.topel@...il.com> To: Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, David Miller <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>, Jesper Dangaard Brouer <hawk@...nel.org>, John Fastabend <john.fastabend@...il.com>, Netdev <netdev@...r.kernel.org>, bpf <bpf@...r.kernel.org>, "Karlsson, Magnus" <magnus.karlsson@...el.com>, Jonathan Lemon <jonathan.lemon@...il.com> Cc: Björn Töpel <bjorn.topel@...el.com>, Maxim Mikityanskiy <maximmi@...lanox.com>, "Fijalkowski, Maciej" <maciej.fijalkowski@...el.com> Subject: Re: [RFC PATCH bpf-next 11/13] xsk: remove MEM_TYPE_ZERO_COPY and corresponding code On Mon, 4 May 2020 at 13:38, Björn Töpel <bjorn.topel@...il.com> wrote: > > From: Björn Töpel <bjorn.topel@...el.com> > > There are no users of MEM_TYPE_ZERO_COPY. Remove all corresponding > code, including the "handle" member of struct xdp_sock. > "struct xdp_buff"
Powered by blists - more mailing lists