[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <167302141678.26939.16929188298412905917.git-patchwork-notify@kernel.org>
Date: Fri, 06 Jan 2023 16:10:16 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Rong Tao <rtoax@...mail.com>
Cc: andrii@...nel.org, rongtao@...tc.cn, ast@...nel.org,
daniel@...earbox.net, martin.lau@...ux.dev, song@...nel.org,
yhs@...com, john.fastabend@...il.com, kpsingh@...nel.org,
sdf@...gle.com, haoluo@...gle.com, jolsa@...nel.org,
bpf@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH bpf-next] libbpf: poison strlcpy()
Hello:
This patch was applied to bpf/bpf-next.git (master)
by Daniel Borkmann <daniel@...earbox.net>:
On Thu, 5 Jan 2023 22:36:33 +0800 you wrote:
> From: Rong Tao <rongtao@...tc.cn>
>
> Since commit 9fc205b413b3("libbpf: Add sane strncpy alternative and use
> it internally") introduce libbpf_strlcpy(), thus add strlcpy() to a poison
> list to prevent accidental use of it.
>
> Signed-off-by: Rong Tao <rongtao@...tc.cn>
>
> [...]
Here is the summary with links:
- [bpf-next] libbpf: poison strlcpy()
https://git.kernel.org/bpf/bpf-next/c/6d0c4b11e743
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists