发自我的 iPhone
> 在 2016年6月29日,下午8:37,Alexei Starovoitov 写道:
>
>> On Wed, Jun 29, 2016 at 06:35:12PM +0800, Wangnan (F) wrote:
>>
>>
>>> On 2016/6/29 18:15, Hekuang wrote:
>>> hi
>>>
在 2016/6/28 22:57, Alexei Starovoitov 写道:
return 0;
}
发自我的 iPhone
> 在 2016年6月29日,下午8:37,Alexei Starovoitov 写道:
>
>> On Wed, Jun 29, 2016 at 06:35:12PM +0800, Wangnan (F) wrote:
>>
>>
>>> On 2016/6/29 18:15, Hekuang wrote:
>>> hi
>>>
在 2016/6/28 22:57, Alexei Starovoitov 写道:
return 0;
}
@@ -465,7 +465,7 @@
On Wed, Jun 29, 2016 at 06:35:12PM +0800, Wangnan (F) wrote:
>
>
> On 2016/6/29 18:15, Hekuang wrote:
> >hi
> >
> >在 2016/6/28 22:57, Alexei Starovoitov 写道:
> >>
> >> return 0;
> >> }
> >>@@ -465,7 +465,7 @@ EXPORT_SYMBOL_GPL(__bpf_call_base);
> >> *
> >> * Decode and execute eBPF
On Wed, Jun 29, 2016 at 06:35:12PM +0800, Wangnan (F) wrote:
>
>
> On 2016/6/29 18:15, Hekuang wrote:
> >hi
> >
> >在 2016/6/28 22:57, Alexei Starovoitov 写道:
> >>
> >> return 0;
> >> }
> >>@@ -465,7 +465,7 @@ EXPORT_SYMBOL_GPL(__bpf_call_base);
> >> *
> >> * Decode and execute eBPF
On 2016/6/29 18:15, Hekuang wrote:
hi
在 2016/6/28 22:57, Alexei Starovoitov 写道:
return 0;
}
@@ -465,7 +465,7 @@ EXPORT_SYMBOL_GPL(__bpf_call_base);
*
* Decode and execute eBPF instructions.
*/
-static unsigned int __bpf_prog_run(void *ctx, const struct bpf_insn
*insn)
On 2016/6/29 18:15, Hekuang wrote:
hi
在 2016/6/28 22:57, Alexei Starovoitov 写道:
return 0;
}
@@ -465,7 +465,7 @@ EXPORT_SYMBOL_GPL(__bpf_call_base);
*
* Decode and execute eBPF instructions.
*/
-static unsigned int __bpf_prog_run(void *ctx, const struct bpf_insn
*insn)
hi
在 2016/6/28 22:57, Alexei Starovoitov 写道:
return 0;
}
@@ -465,7 +465,7 @@ EXPORT_SYMBOL_GPL(__bpf_call_base);
*
* Decode and execute eBPF instructions.
*/
-static unsigned int __bpf_prog_run(void *ctx, const struct bpf_insn *insn)
+unsigned int __bpf_prog_run(void *ctx,
hi
在 2016/6/28 22:57, Alexei Starovoitov 写道:
return 0;
}
@@ -465,7 +465,7 @@ EXPORT_SYMBOL_GPL(__bpf_call_base);
*
* Decode and execute eBPF instructions.
*/
-static unsigned int __bpf_prog_run(void *ctx, const struct bpf_insn *insn)
+unsigned int __bpf_prog_run(void *ctx,
On Tue, Jun 28, 2016 at 07:47:53PM +0800, Hekuang wrote:
>
>
> 在 2016/6/27 4:48, Alexei Starovoitov 写道:
> >On Sun, Jun 26, 2016 at 11:20:52AM +, He Kuang wrote:
> >> bounds check just like ubpf library does.
> >hmm. I don't think I suggested to hack bpf/core.c into separate file
> >and
On Tue, Jun 28, 2016 at 07:47:53PM +0800, Hekuang wrote:
>
>
> 在 2016/6/27 4:48, Alexei Starovoitov 写道:
> >On Sun, Jun 26, 2016 at 11:20:52AM +, He Kuang wrote:
> >> bounds check just like ubpf library does.
> >hmm. I don't think I suggested to hack bpf/core.c into separate file
> >and
在 2016/6/27 4:48, Alexei Starovoitov 写道:
On Sun, Jun 26, 2016 at 11:20:52AM +, He Kuang wrote:
bounds check just like ubpf library does.
hmm. I don't think I suggested to hack bpf/core.c into separate file
and compile it for userspace...
Maybe I misunderstood your suggestion. Now I
在 2016/6/27 4:48, Alexei Starovoitov 写道:
On Sun, Jun 26, 2016 at 11:20:52AM +, He Kuang wrote:
bounds check just like ubpf library does.
hmm. I don't think I suggested to hack bpf/core.c into separate file
and compile it for userspace...
Maybe I misunderstood your suggestion. Now I
hi
在 2016/6/27 4:48, Alexei Starovoitov 写道:
On Sun, Jun 26, 2016 at 11:20:52AM +, He Kuang wrote:
This patchset is based on Wang Nan's v1:
http://thread.gmane.org/gmane.linux.kernel/2203717/focus=2203707
"""
This patch set allows to perf invoke some user space BPF scripts on
hi
在 2016/6/27 4:48, Alexei Starovoitov 写道:
On Sun, Jun 26, 2016 at 11:20:52AM +, He Kuang wrote:
This patchset is based on Wang Nan's v1:
http://thread.gmane.org/gmane.linux.kernel/2203717/focus=2203707
"""
This patch set allows to perf invoke some user space BPF scripts on
On Sun, Jun 26, 2016 at 11:20:52AM +, He Kuang wrote:
> This patchset is based on Wang Nan's v1:
> http://thread.gmane.org/gmane.linux.kernel/2203717/focus=2203707
>
> """
> This patch set allows to perf invoke some user space BPF scripts on
> some point. uBPF scripts and kernel BPF
On Sun, Jun 26, 2016 at 11:20:52AM +, He Kuang wrote:
> This patchset is based on Wang Nan's v1:
> http://thread.gmane.org/gmane.linux.kernel/2203717/focus=2203707
>
> """
> This patch set allows to perf invoke some user space BPF scripts on
> some point. uBPF scripts and kernel BPF
This patchset is based on Wang Nan's v1:
http://thread.gmane.org/gmane.linux.kernel/2203717/focus=2203707
"""
This patch set allows to perf invoke some user space BPF scripts on
some point. uBPF scripts and kernel BPF scripts reside in one BPF
object. They communicate with each other
This patchset is based on Wang Nan's v1:
http://thread.gmane.org/gmane.linux.kernel/2203717/focus=2203707
"""
This patch set allows to perf invoke some user space BPF scripts on
some point. uBPF scripts and kernel BPF scripts reside in one BPF
object. They communicate with each other
18 matches
Mail list logo