lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20140826.231155.421325307812864648.davem@davemloft.net> Date: Tue, 26 Aug 2014 23:11:55 -0700 (PDT) From: David Miller <davem@...emloft.net> To: ast@...mgrid.com Cc: mingo@...nel.org, torvalds@...ux-foundation.org, luto@...capital.net, rostedt@...dmis.org, dborkman@...hat.com, chema@...gle.com, edumazet@...gle.com, a.p.zijlstra@...llo.nl, brendan.d.gregg@...il.com, namhyung@...nel.org, hpa@...or.com, akpm@...ux-foundation.org, keescook@...omium.org, linux-api@...r.kernel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH RFC v7 net-next 00/28] BPF syscall From: Alexei Starovoitov <ast@...mgrid.com> Date: Tue, 26 Aug 2014 19:29:14 -0700 > posting whole thing again as RFC to get feedback on syscall only. > If syscall bpf(int cmd, union bpf_attr *attr, unsigned int size) is ok, I'm personally not reviewing such a large patch series, sorry. You need to submit smaller sets if you want to get reasonable review of your changes and ideas. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists