lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 16 May 2022 09:55:42 +0800 From: Feng Zhou <zhoufeng.zf@...edance.com> To: Daniel Borkmann <daniel@...earbox.net>, ast@...nel.org, andrii@...nel.org, kafai@...com, songliubraving@...com, yhs@...com, john.fastabend@...il.com, kpsingh@...nel.org, rostedt@...dmis.org, mingo@...hat.com, jolsa@...nel.org, davemarchevsky@...com, joannekoong@...com, geliang.tang@...e.com Cc: netdev@...r.kernel.org, bpf@...r.kernel.org, linux-kernel@...r.kernel.org, duanxiongchun@...edance.com, songmuchun@...edance.com, wangdongdong.6@...edance.com, cong.wang@...edance.com, zhouchengming@...edance.com, yosryahmed@...gle.com Subject: Re: [External] Re: [PATCH bpf-next v3 0/2] Introduce access remote cpu elem support in BPF percpu map 在 2022/5/13 下午11:01, Daniel Borkmann 写道: > On 5/13/22 8:39 AM, Feng zhou wrote: > [...] >> Changelog: >> ---------- >> v2->v3: Addressed comments from Andrii Nakryiko. >> - use /* */ instead of // >> - use libbpf_num_possible_cpus() instead of >> sysconf(_SC_NPROCESSORS_ONLN) >> - use 8 bytes for value size >> - fix memory leak >> - use ASSERT_EQ instead of ASSERT_OK >> - add bpf_loop to fetch values on each possible CPU >> some details in here: >> https://lore.kernel.org/lkml/20220511093854.411-1-zhoufeng.zf@bytedance.com/T/ >> > > The v2 of your series is already in bpf-next tree, please just send a > relative diff for > the selftest patch. > > https://lore.kernel.org/lkml/165231901346.29050.11394051230756915389.git-patchwork-notify@kernel.org/ > > > Thanks, > Daniel Ok, will do. Thanks.
Powered by blists - more mailing lists