lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20151008.052718.857300198002962191.davem@davemloft.net>
Date:	Thu, 08 Oct 2015 05:27:18 -0700 (PDT)
From:	David Miller <davem@...emloft.net>
To:	daniel@...earbox.net
Cc:	hannes@...essinduktion.org, ast@...mgrid.com,
	netdev@...r.kernel.org
Subject: Re: [PATCH net-next v2 0/5] BPF/random32 updates

From: Daniel Borkmann <daniel@...earbox.net>
Date: Thu,  8 Oct 2015 01:20:34 +0200

> BPF update to split the prandom state apart, and to move the
> *once helpers to the core. For details, please see individual
> patches. Given the changes and since it's in the tree for
> quite some time, net-next is a better choice in our opinion.
> 
> v1 -> v2:
>  - Make DO_ONCE() type-safe, remove the kvec helper. Credits
>    go to Alexei Starovoitov for the __VA_ARGS__ hint, thanks!
>  - Add a comment to the DO_ONCE() helper as suggested by Alexei.
>  - Rework prandom_init_once() helper to the new API.
>  - Keep Alexei's Acked-by on the last patch.

Series applied, thanks everyone.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ