lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 12 Jan 2017 02:21:31 +0100 From: Daniel Borkmann <daniel@...earbox.net> To: davem@...emloft.net Cc: alexei.starovoitov@...il.com, netdev@...r.kernel.org, Daniel Borkmann <daniel@...earbox.net> Subject: [PATCH net-next 0/2] More flexible BPF cb access This patch improves BPF's cb access by allowing b/h/w/dw access variants on it. For details, please see individual patches. Thanks! Daniel Borkmann (2): bpf: pass original insn directly to convert_ctx_access bpf: allow b/h/w/dw access for bpf's cb in ctx include/linux/bpf.h | 7 +- kernel/bpf/verifier.c | 11 +- kernel/trace/bpf_trace.c | 15 +- net/core/filter.c | 176 ++++++----- tools/testing/selftests/bpf/test_verifier.c | 442 +++++++++++++++++++++++++++- 5 files changed, 563 insertions(+), 88 deletions(-) -- 1.9.3
Powered by blists - more mailing lists