[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <E5742A1C-28F8-423F-8568-1025C9DF4431@fb.com>
Date: Wed, 23 Sep 2020 21:50:36 +0000
From: Song Liu <songliubraving@...com>
To: Networking <netdev@...r.kernel.org>, bpf <bpf@...r.kernel.org>
CC: Kernel Team <Kernel-team@...com>,
"ast@...nel.org" <ast@...nel.org>,
"daniel@...earbox.net" <daniel@...earbox.net>,
"john.fastabend@...il.com" <john.fastabend@...il.com>,
"kpsingh@...omium.org" <kpsingh@...omium.org>
Subject: Re: [PATCH v3 bpf-next 0/3] enable BPF_PROG_TEST_RUN for raw_tp
> On Sep 23, 2020, at 2:33 PM, Song Liu <songliubraving@...com> wrote:
>
> This set enables BPF_PROG_TEST_RUN for raw_tracepoint type programs. This
> set also enables running the raw_tp program on a specific CPU. This feature
> can be used by user space to trigger programs that access percpu resources,
> e.g. perf_event, percpu variables.
>
> Changes v2 => v3:
> 1. Fix memory leak in the selftest. (Andrii)
> 2. Use __u64 instead of unsigned long long. (Andrii)
>
> Changes v1 => v2:
> 1. More checks for retval in the selftest. (John)
> 2. Remove unnecessary goto in bpf_prog_test_run_raw_tp. (John)
I somehow missed Andrii's other comments and sent v3 too fast.
Please ignore this version.
Powered by blists - more mailing lists