lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Mon, 14 Dec 2020 18:10:39 -0800
From:   Jakub Kicinski <kuba@...nel.org>
To:     Daniel Borkmann <daniel@...earbox.net>
Cc:     davem@...emloft.net, ast@...nel.org, netdev@...r.kernel.org,
        bpf@...r.kernel.org
Subject: Re: pull-request: bpf-next 2020-12-14

On Mon, 14 Dec 2020 22:43:16 +0100 Daniel Borkmann wrote:
> 1) Expose bpf_sk_storage_*() helpers to iterator programs, from Florent Revest.
> 
> 2) Add AF_XDP selftests based on veth devs to BPF selftests, from Weqaar Janjua.
> 
> 3) Support for finding BTF based kernel attach targets through libbpf's
>    bpf_program__set_attach_target() API, from Andrii Nakryiko.
> 
> 4) Permit pointers on stack for helper calls in the verifier, from Yonghong Song.
> 
> 5) Fix overflows in hash map elem size after rlimit removal, from Eric Dumazet.
> 
> 6) Get rid of direct invocation of llc in BPF selftests, from Andrew Delgadillo.
> 
> 7) Fix xsk_recvmsg() to reorder socket state check before access, from Björn Töpel.
> 
> 8) Add new libbpf API helper to retrieve ring buffer epoll fd, from Brendan Jackman.
> 
> 9) Batch of minor BPF selftest improvements all over the place, from Florian Lehner,
>    KP Singh, Jiri Olsa and various others.

Looks like the reply bot is not keeping it 100.. I'll report 
to Konstantin after the merge window craziness is over.

Pulled, thanks!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ