|
Message-ID: <CAGXu5jLeCB-H0nkVtpJN5SSz4r4idnKJbnV+rO610nw-o98wCQ@mail.gmail.com> Date: Mon, 15 May 2017 10:44:07 -0700 From: Kees Cook <keescook@...omium.org> To: Shubham Bansal <illusionist.neo@...il.com> Cc: David Miller <davem@...emloft.net>, Mircea Gherzan <mgherzan@...il.com>, Network Development <netdev@...r.kernel.org>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, "linux-arm-kernel@...ts.infradead.org" <linux-arm-kernel@...ts.infradead.org>, ast@...com, Daniel Borkmann <daniel@...earbox.net> Subject: Re: arch: arm: bpf: Converting cBPF to eBPF for arm 32 bit On Sat, May 13, 2017 at 2:38 PM, Shubham Bansal <illusionist.neo@...il.com> wrote: > Finally finished testing. > > "test_bpf: Summary: 314 PASSED, 0 FAILED, [274/306 JIT'ed]" Nice work! Glad you've been chipping away at this. Thanks! -Kees > > Will send the patch after code refactoring. Thanks for all the help > you guys. I really really appreciate it. > > Special thanks to Kees and Daniel. :) > > Best, > Shubham Bansal > > > On Thu, May 11, 2017 at 9:00 PM, Kees Cook <keescook@...omium.org> wrote: >> On Thu, May 11, 2017 at 2:32 AM, Shubham Bansal >> <illusionist.neo@...il.com> wrote: >>> What do you guys suggest i should implement it? I am almost done with >>> my current implementation but if you think I should change it to the >>> way David suggested, its better to suggest now before I send the >>> patch. >> >> I'd say send what you have right now, as it's a good starting point >> for future work. I'll be curious to see the benchmarks, etc. It can be >> a base for further optimization. >> >> Thanks for chipping away at this! >> >> -Kees >> >> -- >> Kees Cook >> Pixel Security -- Kees Cook Pixel Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.